www-malware-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

all.html malware-adobe.html malware-amazon.html malware-apple.htm...


From: Diff Report
Subject: all.html malware-adobe.html malware-amazon.html malware-apple.htm...
Date: Thu, 14 Apr 2022 00:04:15 -0400

Modified:

    all.html
    malware-adobe.html
    malware-amazon.html
    malware-apple.html
    malware-appliances.html
    malware-cars.html
    malware-edtech.html
    malware-games.html
    malware-google.html
    malware-in-online-conferencing.html
    malware-microsoft.html
    malware-mobiles.html
    malware-webpages.html
    potential-malware.html
    proprietary-addictions.html
    proprietary-back-doors.html
    proprietary-censorship.html
    proprietary-coverups.html
    proprietary-deception.html
    proprietary-drm.html
    proprietary-fraud.html
    proprietary-insecurity.html
    proprietary-interference.html
    proprietary-jails.html
    proprietary-manipulation.html
    proprietary-obsolescence.html
    proprietary-sabotage.html
    proprietary-surveillance.html
    proprietary-tethers.html
    proprietary-tyrants.html

diff -rNU2 all.html all.html
--- all.html    2022-04-13 04:04:23.073444545 +0000
+++ all.html    2022-04-14 04:04:14.879112403 +0000
@@ -153,5 +153,5 @@
     removed the ability to install other operating
     systems</a>. Then users broke that restriction too, but <a
-    
href="https://www.engadget.com/2011/01/12/sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps/";>got
+    
href="https://www.engadget.com/2011-01-12-sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps.html";>got
     sued by Sony</a>.</p>
   </li>
@@ -649,5 +649,5 @@
 <!--#set var='ADD' value='2021-03-09' --><!--#set var='PUB' value='2020-04-30' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/";>are
     collecting user's personal and identifiable data</a> including how long
     a call lasts, who's participating in the call, and the IP addresses
@@ -803,5 +803,5 @@
 <!--#set var='ADD' value='2021-01-05' --><!--#set var='PUB' value='2021-01-05' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Most Internet connected devices in Mozilla's <a
-    href="https://foundation.mozilla.org/en/privacynotincluded";>&ldquo;Privacy
+    href="https://foundation.mozilla.org/en/privacynotincluded/";>&ldquo;Privacy
     Not Included&rdquo;</a> list <a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell";>are
@@ -856,5 +856,5 @@
     <p>While the world is still
     struggling with COVID-19 coronavirus, many <a
-    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/";>people
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus";>people
     are in danger of surveillance</a> and their computers are infected
     with malware as a result of installing proprietary software.</p>
@@ -944,5 +944,5 @@
 <!--#set var='ADD' value='2020-11-25' --><!--#set var='PUB' value='2020-11-12' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Apple has <a
-    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours/";>implemented
     a malware in its computers that imposes surveillance</a> on users
     and reports users' computing to Apple.</p>
@@ -1267,5 +1267,5 @@
     <p>Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start <a
-    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
+    
href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
     paying a monthly fee for the use of that server</a>.  Because of the
     tethering, the hub is useless without that.</p>
@@ -1302,5 +1302,5 @@
 
 <!--#set var='ADD' value='2020-04-14' --><!--#set var='PUB' value='2020-04-13' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
-    <p>The <a href="https://www.google.com/mobile/android/market-tos.html";>
+    <p>The <a href="https://play.google.com/about/play-terms/";>
     Google Play Terms of Service</a> insist that the user of Android accept
     the presence of universal back doors in apps released by Google.</p>
@@ -1532,5 +1532,5 @@
 <!--#set var='ADD' value='2019-10-03' --><!--#set var='PUB' value='2017-08-31' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>The recent versions of Microsoft Office require the user to <a
-    
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+    
href="https://www.microsoft.com/en-us/microsoft-365/microsoft-365-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
     connect to Microsoft servers at least every thirty-one
     days</a>. Otherwise, the software will refuse to edit any documents
@@ -1558,5 +1558,5 @@
     <p>ChromeBooks are programmed for obsolescence:
     ChromeOS has a universal back door that is used for updates and <a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
     ceases to operate at a predefined date</a>. From then on, there
     appears to be no support whatsoever for the computer.</p>
@@ -1602,5 +1602,5 @@
 <!--#set var='ADD' value='2019-08-31' --><!--#set var='PUB' value='2019-08-16' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>A game published on Facebook <a
-    
href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>aimed
+    
href="https://revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>aimed
     at leading children to spend</a> large amounts of their parents'
     money without explaining it to them.</p>
@@ -1684,5 +1684,5 @@
     competitors further qualifies it as <em>predatory</em>. 
     Note that Belgium <a
-    
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/";>
+    
href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium";>
     made these loot boxes illegal</a> in 2018.</p>
 
@@ -1813,5 +1813,5 @@
 <!--#set var='ADD' value='2019-05-08' --><!--#set var='PUB' value='2019-04-26' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>The Jibo robot toys were tethered to the manufacturer's server,
-    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    and <a 
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648";>
     the company made them all cease to work</a> by shutting down that
     server.</p>
@@ -1824,5 +1824,5 @@
 <!--#set var='ADD' value='2019-05-08' --><!--#set var='PUB' value='2019-02-01' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>The FordPass Connect feature of some Ford vehicles has <a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+    
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
     near-complete access to the internal car network</a>. It is constantly
     connected to the cellular phone network and sends Ford a lot of data,
@@ -1888,5 +1888,5 @@
     program</a> on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
+    
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
     tampering with users' settings and files</a>, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
@@ -1910,5 +1910,5 @@
 <!--#set var='ADD' value='2019-04-20' --><!--#set var='PUB' value='2019-04-15' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p id="M201509210">Volkswagen programmed its car engine computers to <a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
+    href="https://petri.com/volkswagen-used-software-to-cheat-on-emissions/";>
     detect the Environmental Protection Agency's emission tests</a>, and
     run dirty the rest of the time. In real driving, the cars exceeded
@@ -1966,5 +1966,5 @@
 <!--#set var='ADD' value='2019-04-11' --><!--#set var='PUB' value='2019-03-21' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>The Medtronics Conexus Telemetry Protocol has <a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+    
href="https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
     two vulnerabilities that affect several models of implantable
     defibrillators</a> and the devices they connect to.</p>
@@ -2076,5 +2076,5 @@
     <p>In China, it is mandatory for electric
     cars to be equipped with a terminal that <a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca";>
+    
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca";>
     transfers technical data, including car location,
     to a government-run platform</a>. In practice, <a
@@ -2125,10 +2125,10 @@
 <!--#set var='ADD' value='2019-03-04' --><!--#set var='PUB' value='2019-02-14' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>The AppCensus database gives information on <a
-    href="https://www.appcensus.mobi";> how Android apps use and
+    href="https://www.appcensus.io/";> how Android apps use and
     misuse users' personal data</a>. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the <a
     href="/proprietary/proprietary-surveillance.html#M201812290">
     Advertising ID</a> to other companies, and <a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/";>
+    href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/";>
     18,000 (23% of the total) link this ID to hardware identifiers</a>,
     so that users cannot escape tracking by resetting it.</p>
@@ -2225,5 +2225,5 @@
     <p>An investigation of the 150 most popular
     gratis VPN apps in Google Play found that <a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/";>
+    
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/";>
     25% fail to protect their users' privacy</a> due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
@@ -2233,5 +2233,5 @@
 
     <p>Moreover, a previous investigation had found that <a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/";>half of
+    
href="https://www.top10vpn.com/research/free-vpn-investigations/ownership/";>half
 of
     the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
 
@@ -2339,5 +2339,5 @@
 <!--#set var='ADD' value='2019-01-13' --><!--#set var='PUB' value='2019-01-10' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Amazon Ring &ldquo;security&rdquo; devices <a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/";>
+    
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html";>
     send the video they capture to Amazon servers</a>, which save it
     long-term.</p>
@@ -2388,5 +2388,5 @@
 <!--#set var='ADD' value='2018-12-04' --><!--#set var='PUB' value='2018-11-27' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    
href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
     to snoop on information that users have typed into a
     form but not sent</a>, in order to learn their identity. Some are <a
@@ -2440,5 +2440,5 @@
 <!--#set var='ADD' value='2018-11-04' --><!--#set var='PUB' value='2018-10-30' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Nearly all &ldquo;home security cameras&rdquo; <a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/";>
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/";>
     give the manufacturer an unencrypted copy of everything they
     see</a>. &ldquo;Home insecurity camera&rdquo; would be a better
@@ -2453,5 +2453,5 @@
 <!--#set var='ADD' value='2018-10-30' --><!--#set var='PUB' value='2018-10-24' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Some Android apps <a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
+    
href="https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
     track the phones of users that have deleted them</a>.</p>
   </li>
@@ -2493,5 +2493,5 @@
 <!--#set var='ADD' value='2018-10-11' --><!--#set var='PUB' value='2018-07-31' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>A nonfree video game, available through the nonfree Steam client, <a
-    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-cryptocurrency-miners";>
     included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks
     the CPU in users' computers to mine a cryptocurrency.</p>
@@ -2500,5 +2500,5 @@
 <!--#set var='ADD' value='2018-10-11' --><!--#set var='PUB' value='2018-05-08' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>A cracker used an exploit in outdated software to <a
-    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+    
href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors";>
     inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
     type of malware hijacks the computer's processor to mine a
@@ -2534,5 +2534,5 @@
 <!--#set var='ADD' value='2018-09-25' --><!--#set var='PUB' value='2018-09-24' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Researchers have discovered how to <a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
+    
href="https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
     hide voice commands in other audio</a>, so that people cannot hear
     them, but Alexa and Siri can.</p>
@@ -2541,5 +2541,5 @@
 <!--#set var='ADD' value='2018-09-22' --><!--#set var='PUB' value='2018-09-14' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Android has a <a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
+    
href="https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
     back door for remotely changing &ldquo;user&rdquo; settings</a>.</p>
 
@@ -2584,5 +2584,5 @@
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
-    
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+    
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
     shut down the server, and all copies stopped working</a>.</p>
   </li>
@@ -2655,5 +2655,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/12 12:48:58 $
+$Date: 2022/04/13 12:46:51 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-adobe.html malware-adobe.html
--- malware-adobe.html  2022-04-13 04:04:23.077444546 +0000
+++ malware-adobe.html  2022-04-14 04:04:14.879112403 +0000
@@ -83,5 +83,5 @@
     <p>Adobe nonfree software may halt
     all other work and freeze a computer <a
-    href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
+    href="https://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
     to perform a license check</a>, at a random time every 30 days.</p>
   </li>
@@ -127,5 +127,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Adobe applications have time bombs: they <a
-    
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
+    
href="https://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
     stop working after a certain time</a>, after which the user
     must pay to extend the time.</p>
@@ -187,5 +187,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2016, 2018-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016, 2018-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -197,5 +197,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:50 $
+$Date: 2022/04/13 07:56:41 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-amazon.html malware-amazon.html
--- malware-amazon.html 2022-04-13 04:04:23.077444546 +0000
+++ malware-amazon.html 2022-04-14 04:04:14.883112407 +0000
@@ -83,5 +83,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon <a
-    
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
+    
href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/";>
     downgraded the software in users' Swindles</a> so that those already
     rooted would cease to function at all.</p>
@@ -92,5 +92,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Amazon Kindle-Swindle has a back door that has been used to <a
-    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+    
href="https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
     remotely erase books</a>.  One of the books erased was
     <cite>1984</cite>, by George Orwell.</p>
@@ -99,5 +99,5 @@
     would delete books only following orders from the
     state.  However, that policy didn't last.  In 2012 it <a
-    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
+    
href="https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
     wiped a user's Kindle-Swindle and deleted her account</a>, then
     offered her kafkaesque &ldquo;explanations.&rdquo;</p>
@@ -294,5 +294,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon Ring &ldquo;security&rdquo; devices <a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/";>
+    
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html";>
     send the video they capture to Amazon servers</a>, which save it
     long-term.</p>
@@ -311,5 +311,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon recently invited consumers to be suckers and <a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
+    
href="https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/";>
     allow delivery staff to open their front doors</a>. Wouldn't you know
     it, the system has a grave security flaw.</p>
@@ -320,5 +320,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Amazon &ldquo;Smart&rdquo; TV is <a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
+    
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
     snooping all the time</a>.</p>
   </li>
@@ -384,5 +384,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/05 18:50:46 $
+$Date: 2022/04/13 09:28:11 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-apple.html malware-apple.html
--- malware-apple.html  2022-04-13 04:04:23.081444546 +0000
+++ malware-apple.html  2022-04-14 04:04:14.887112410 +0000
@@ -115,5 +115,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The iPhone has a back door for <a
-    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+    
href="https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
     remote wipe</a>.  It's not always enabled, but users are led into
     enabling it without understanding.</p>
@@ -124,5 +124,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The iPhone has a back door <a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+    
href="https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
     that allows Apple to remotely delete apps</a> which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
@@ -202,5 +202,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2007-08</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
+    <p><a href="https://arstechnica.com/gadgets/2007/08/aacs-tentacles/";>
     DRM that caters to Bluray disks</a>.  (The article focused on Windows
     and said that MacOS would do the same thing subsequently.)</p>
@@ -330,5 +330,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple has <a
-    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours/";>implemented
     a malware in its computers that imposes surveillance</a> on users
     and reports users' computing to Apple.</p>
@@ -470,5 +470,5 @@
 
     <p>Here is an article about the <a
-    href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
+    href="https://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
     code signing</a> that the iThings use to lock up the user.</p>
 
@@ -577,5 +577,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple used its censorship system to enforce Russian surveillance <a
-    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>
+    
href="https://web.archive.org/web/20220402210254/https://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html";>
     by blocking distribution of the LinkedIn app in Russia</a>.</p>
 
@@ -601,5 +601,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple censors games, <a
-    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
+    
href="https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/";>
     banning some games from the cr&hellip;app store</a> because of which
     political points they suggest. Some political points are apparently
@@ -610,5 +610,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
+    <p>Apple <a href="https://www.ifixit.com/News/7401/ifixit-app-pulled";>
     banned a program from the App Store</a> because its developers
     committed the enormity of disassembling some iThings.</p>
@@ -619,10 +619,10 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>As of 2015, Apple <a
-    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
+    
href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
     systematically bans apps that endorse abortion rights or would help
     women find abortions</a>.</p>
 
     <p>This particular political slant <a
-    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
+    
href="https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
     affects other Apple services</a>.</p>
   </li>
@@ -633,5 +633,5 @@
     <p>Apple has banned iThing
     applications that show the confederate flag.  <a
-    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
+    href="https://www.huffpost.com/entry/apple-confederate-flag_n_7663754";>
     Not only those that use it as a symbol of racism</a>, but even
     strategic games that use it to represent confederate army units
@@ -650,5 +650,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
+    
href="https://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
     More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
   </li>
@@ -658,7 +658,7 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple used this censorship power in 2014 to <a
-    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
+    
href="https://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
     ban all bitcoin apps</a> for the iThings for a time.  It also <a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
+    
href="https://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
     banned a game about growing marijuana</a>, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
@@ -673,5 +673,5 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple <a
-    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>
+    href="https://mashable.com/archive/apple-app-tracks-drone-strikes";>
     admitted it was censoring the app based on the subject matter</a>.</p>
   </li>
@@ -686,5 +686,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>&ldquo;Dark patterns&rdquo; are <a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
+    
href="https://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
     interfaces designed to mislead users, or make option settings hard
     to find</a>.</p>
@@ -706,5 +706,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple Siri <a
-    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
+    
href="https://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
     to give you information</a> about music charts if you're not an Apple
     Music subscriber.</p>
@@ -758,5 +758,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html";>
+    
href="https://www.macworld.com/article/230582/apple-file-system-apfs-faq.html";>
     changes the file system from HFS+  to APFS</a>, which cannot be
     accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
@@ -793,5 +793,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple <a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
+    
href="https://www.theregister.com/2016/04/14/uninstall_quicktime_for_windows/";>
     stops users from fixing the security bugs in Quicktime for Windows</a>,
     while refusing to fix them itself.</p>
@@ -832,5 +832,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple <a
-    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
+    
href="https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
     deleted from iPods the music that users had got from internet music
     stores that competed with iTunes</a>.</p>
@@ -1037,5 +1037,5 @@
     make are automatically updated everywhere. [&hellip;] </p></blockquote>
 
-    <p>(From <a href="https://www.apple.com/icloud/photos/";>Apple's iCloud
+    <p>(From <a 
href="https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/";>Apple's
 iCloud
     information</a> as accessed on 24 Sep 2015.) The iCloud feature is
     <a href="https://support.apple.com/en-us/HT202033";>activated by the
@@ -1059,5 +1059,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple has made various <a
-    
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
+    
href="https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
     MacOS programs send files to Apple servers without asking
     permission</a>.  This exposes the files to Big Brother and perhaps
@@ -1086,5 +1086,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple admits the <a
-    
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
+    
href="https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
     spying in a search facility</a>, but there's a lot <a
     href="https://github.com/fix-macosx/yosemite-phone-home";> more snooping
@@ -1096,5 +1096,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Various operations in <a
-    
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
+    
href="https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
     the latest MacOS send reports to Apple</a> servers.</p>
   </li>
@@ -1104,5 +1104,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple can, and regularly does, <a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+    
href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
     remotely extract some data from iPhones for the state</a>.</p>
 
@@ -1110,5 +1110,5 @@
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
     iOS 8 security improvements</a>; but <a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
+    href="https://theintercept.com/2014/09/22/apple-data/";>
     not as much as Apple claims</a>.</p>
   </li>
@@ -1118,5 +1118,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+    
href="https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
     Several &ldquo;features&rdquo; of iOS seem to exist
     for no possible purpose other than surveillance</a>.  Here is the <a
@@ -1129,5 +1129,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+    
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     Spotlight search</a> sends users' search terms to Apple.</p>
   </li>
@@ -1137,5 +1137,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The <a class="not-a-duplicate"
-    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+    
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     iBeacon</a> lets stores determine exactly where the iThing is, and
     get other info too.</p>
@@ -1146,5 +1146,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
+    
href="https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
     Either Apple helps the NSA snoop on all the data in an iThing, or it
     is totally incompetent</a>.</p>
@@ -1155,5 +1155,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The iThing also <a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
+    
href="https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
     tells Apple its geolocation</a> by default, though that can be
     turned off.</p>
@@ -1164,5 +1164,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>There is also a feature for web sites to track users, which is <a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
+    
href="https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
     enabled by default</a>.  (That article talks about iOS 6, but it is
     still true in iOS 7.)</p>
@@ -1191,5 +1191,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple arbitrarily <a
-    href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
+    href="https://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
     users from installing old versions of iOS</a>.</p>
   </li>
@@ -1265,5 +1265,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/12 12:48:57 $
+$Date: 2022/04/13 07:49:50 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-appliances.html malware-appliances.html
--- malware-appliances.html     2022-04-13 04:04:23.085444545 +0000
+++ malware-appliances.html     2022-04-14 04:04:14.887112410 +0000
@@ -125,5 +125,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Most Internet connected devices in Mozilla's <a
-    href="https://foundation.mozilla.org/en/privacynotincluded";>&ldquo;Privacy
+    href="https://foundation.mozilla.org/en/privacynotincluded/";>&ldquo;Privacy
     Not Included&rdquo;</a> list <a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell";>are
@@ -213,5 +213,5 @@
     <p>Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start <a
-    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
+    
href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
     paying a monthly fee for the use of that server</a>.  Because of the
     tethering, the hub is useless without that.</p>
@@ -262,5 +262,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Jibo robot toys were tethered to the manufacturer's server,
-    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    and <a 
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648";>
     the company made them all cease to work</a> by shutting down that
     server.</p>
@@ -275,5 +275,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Medtronics Conexus Telemetry Protocol has <a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+    
href="https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
     two vulnerabilities that affect several models of implantable
     defibrillators</a> and the devices they connect to.</p>
@@ -322,5 +322,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon Ring &ldquo;security&rdquo; devices <a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/";>
+    
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html";>
     send the video they capture to Amazon servers</a>, which save it
     long-term.</p>
@@ -365,5 +365,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Nearly all &ldquo;home security cameras&rdquo; <a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/";>
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/";>
     give the manufacturer an unencrypted copy of everything they
     see</a>. &ldquo;Home insecurity camera&rdquo; would be a better
@@ -406,5 +406,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Researchers have discovered how to <a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
+    
href="https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
     hide voice commands in other audio</a>, so that people cannot hear
     them, but Alexa and Siri can.</p>
@@ -430,5 +430,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A medical insurance company <a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next";>
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/";>
     offers a gratis electronic toothbrush that snoops on its user by
     sending usage data back over the Internet</a>.</p>
@@ -474,5 +474,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon recently invited consumers to be suckers and <a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
+    
href="https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/";>
     allow delivery staff to open their front doors</a>. Wouldn't you know
     it, the system has a grave security flaw.</p>
@@ -483,5 +483,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A remote-control sex toy was found to make <a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei";>audio
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance";>audio
     recordings of the conversation between two users</a>.</p>
   </li>
@@ -524,5 +524,5 @@
     <p>A &ldquo;smart&rdquo; intravenous pump
     designed for hospitals is connected to the internet. Naturally <a
-    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
+    
href="https://www.techdirt.com/2017/09/22/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack/";>
     its security has been cracked</a>.</p>
 
@@ -536,5 +536,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The bad security in many Internet of Stings devices allows <a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+    
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/";>ISPs
     to snoop on the people that use them</a>.</p>
 
@@ -549,5 +549,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Sonos <a
-    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
+    
href="https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
     told all its customers, &ldquo;Agree&rdquo;
     to snooping or the product will stop working</a>.  <a
@@ -573,5 +573,5 @@
     are tremendously insecure.  They have login
     accounts with hard-coded passwords, which can't be changed, and <a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>there
+    
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>there
     is no way to delete these accounts either</a>.</p>
   </li>
@@ -582,5 +582,5 @@
     <p>The proprietary code that runs pacemakers,
     insulin pumps, and other medical devices is <a
-    href="http://www.bbc.co.uk/news/technology-40042584";> full of gross
+    href="https://www.bbc.com/news/technology-40042584";> full of gross
     security faults</a>.</p>
   </li>
@@ -591,5 +591,5 @@
     <p>Bird and rabbit pets were implemented for Second
     Life by a company that tethered their food to a server.  <a
-    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying";>
+    
href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying";>
     It shut down the server and the pets more or less died</a>.</p>
   </li>
@@ -698,5 +698,5 @@
     <p>If you buy a used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually <a
-    
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>the
+    
href="https://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>the
     previous owners can still remotely control it</a>.</p>
   </li>
@@ -706,5 +706,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio &ldquo;smart&rdquo; <a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
+    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
     report everything that is viewed on them, and not just broadcasts and
     cable</a>. Even if the image is coming from the user's own computer,
@@ -746,5 +746,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The developer of Ham Radio Deluxe <a
-    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>sabotaged
+    
href="https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/";>sabotaged
     a customer's installation as punishment for posting a negative
     review</a>.</p>
@@ -759,5 +759,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/";>remotely
     controlled with a mobile phone</a>; physical access is not
     necessary. This would enable crackers to listen in on a child's
@@ -790,5 +790,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a
-    
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
+    
href="https://arstechnica.com/information-technology/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
     unauthorized people can remotely control it</a>.</p>
 
@@ -843,5 +843,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The <a
-    href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
+    href="https://michaelweinberg.org/post/137045828005/free-the-cube";>
     &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it
     won't accept third-party printing materials.  It is the Keurig of
@@ -851,5 +851,5 @@
 
     <p>With a <a
-    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+    href="https://www.fsf.org/resources/hw/endorsement/aleph-objects";>
     printer that gets the Respects Your Freedom</a>, this problem would
     not even be a remote possibility.</p>
@@ -869,5 +869,5 @@
     <p>Philips &ldquo;smart&rdquo; lightbulbs had initially been
     designed to interact with other companies' smart light bulbs, but <a
-    
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+    
href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/";>
     later the company updated the firmware to disallow
     interoperability</a>.</p>
@@ -881,9 +881,9 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
+    
href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
     Some D-Link routers</a> have a back door for changing settings in a
     dlink of an eye.</p>
 
-    <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";> The TP-Link
+    <p><a href="https://sekurak.pl/tp-link-httptftp-backdoor/";> The TP-Link
     router has a back door</a>.</p>
 
@@ -896,5 +896,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Nest Cam &ldquo;smart&rdquo; camera is <a
-    href="http://www.bbc.com/news/technology-34922712";>always watching</a>,
+    href="https://www.bbc.com/news/technology-34922712";>always watching</a>,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;</p>
 
@@ -919,5 +919,5 @@
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other <a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
+    
href="https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
     cross-device tracking</a>.</p>
   </li>
@@ -945,5 +945,5 @@
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now <a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
+    href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
     correlate TV advertisement with online purchases</a>, exposing all
     users to new combined surveillance by default.</p>
@@ -954,5 +954,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>FitBit fitness trackers have a <a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+    
href="https://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
     Bluetooth vulnerability</a> that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
@@ -974,5 +974,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio &ldquo;smart&rdquo; TVs recognize and <a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>track
+    href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html";>track
     what people are watching</a>, even if it isn't a TV channel.</p>
   </li>
@@ -982,5 +982,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Due to bad security in a drug pump, crackers could use it to <a
-    
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
+    
href="https://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
     kill patients</a>.</p>
   </li>
@@ -990,5 +990,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Verizon cable TV <a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
+    
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
     snoops on what programs people watch, and even what they wanted to
     record</a>.</p>
@@ -1012,5 +1012,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio <a
-    href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+    
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch</a>.  The TVs did not do that when first sold.</p>
@@ -1021,5 +1021,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Barbie <a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>is
+    
href="https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>is
     going to spy on children and adults</a>.</p>
   </li>
@@ -1038,5 +1038,5 @@
 
     <p>In its privacy policy, Samsung explicitly confirms that <a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
+    
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
     data containing sensitive information will be transmitted to third
     parties</a>.</p>
@@ -1047,5 +1047,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Amazon &ldquo;Smart&rdquo; TV is <a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
+    
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
     snooping all the time</a>.</p>
   </li>
@@ -1055,5 +1055,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>More or less all &ldquo;smart&rdquo; TVs <a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
+    
href="https://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
     on their users</a>.</p>
 
@@ -1075,5 +1075,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="nest-thermometers">Nest thermometers send <a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a lot of
+    href="https://bgr.com/general/google-nest-jailbreak-hack/";>a lot of
     data about the user</a>.</p>
   </li>
@@ -1083,5 +1083,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>LG <a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+    
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/";>
     disabled network features</a> on <em>previously purchased</em>
     &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
@@ -1093,5 +1093,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Lots of <a
-    href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
+    href="https://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
     hospital equipment has lousy security</a>, and it can be fatal.</p>
   </li>
@@ -1100,5 +1100,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="http://www.bunniestudios.com/blog/?p=3554";> Some flash
+    <p><a href="https://www.bunniestudios.com/blog/?p=3554";> Some flash
     memories have modifiable software</a>, which makes them vulnerable
     to viruses.</p>
@@ -1114,5 +1114,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+    
href="https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
     Point-of-sale terminals running Windows were taken over</a> and
     turned into a botnet for the purpose of collecting customers' credit
@@ -1124,5 +1124,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
+    
href="https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
     reports what the user watches, and the switch to turn this off has
     no effect</a>.  (The fact that the transmission reports a 404 error
@@ -1130,5 +1130,5 @@
 
     <p>Even worse, it <a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
+    
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/";>
     snoops on other devices on the user's local network</a>.</p>
 
@@ -1141,5 +1141,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="bluray"><a
-    
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
+    
href="https://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
     DVDs and Bluray disks have DRM</a>.</p>
 
@@ -1160,5 +1160,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The FTC punished a company for making webcams with <a
-    
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
+    
href="https://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
     bad security so that it was easy for anyone to watch through
     them</a>.</p>
@@ -1178,8 +1178,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p> It is possible to <a
-    
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
+    
href="https://siliconangle.com/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
     kill people by taking control of medical
     implants by radio</a>.  More information in <a
-    href="http://www.bbc.co.uk/news/technology-17631838";>BBC
+    href="https://www.bbc.com/news/technology-17631838";>BBC
     News</a> and <a
     
href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/";>
@@ -1191,5 +1191,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
+    
href="https://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
     &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to
     intrusion.</p>
@@ -1213,5 +1213,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Cisco TNP IP phones are <a
-    href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
+    
href="https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
     spying devices</a>.</p>
   </li>
@@ -1306,5 +1306,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/06 07:41:52 $
+$Date: 2022/04/13 16:08:50 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-cars.html malware-cars.html
--- malware-cars.html   2022-04-13 04:04:23.085444545 +0000
+++ malware-cars.html   2022-04-14 04:04:14.891112414 +0000
@@ -111,5 +111,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="M201509210">Volkswagen programmed its car engine computers to <a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
+    href="https://petri.com/volkswagen-used-software-to-cheat-on-emissions/";>
     detect the Environmental Protection Agency's emission tests</a>, and
     run dirty the rest of the time. In real driving, the cars exceeded
@@ -138,5 +138,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The FordPass Connect feature of some Ford vehicles has <a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+    
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
     near-complete access to the internal car network</a>. It is constantly
     connected to the cellular phone network and sends Ford a lot of data,
@@ -166,5 +166,5 @@
     <p>In China, it is mandatory for electric
     cars to be equipped with a terminal that <a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca";>
+    
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca";>
     transfers technical data, including car location,
     to a government-run platform</a>. In practice, <a
@@ -244,5 +244,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
+    
href="https://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
     Audi's proprietary software used a simple method to cheat on emissions
     tests</a>: to activate a special low-emission gearshifting mode until
@@ -254,5 +254,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Due to weak security, <a
-    
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>it
+    
href="https://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>it
     is easy to open the doors of 100 million cars built by
     Volkswagen</a>.</p>
@@ -292,5 +292,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Caterpillar vehicles come with <a
-    
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
+    
href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
     a back door to shutoff the engine</a> remotely.</p>
   </li>
@@ -300,5 +300,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Security researchers discovered a <a
-    
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
+    
href="https://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
     vulnerability in diagnostic dongles used for vehicle tracking and
     insurance</a> that let them take remote control of a car or lorry
@@ -310,5 +310,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Crackers were able to <a
-    
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
+    
href="https://arstechnica.com/information-technology/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
     take remote control of the Jeep</a> &ldquo;connected car&rdquo;. They
     could track the car, start or stop the engine, and activate or
@@ -345,5 +345,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="records-drivers">Proprietary software in cars <a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
+    
href="https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
     records information about drivers' movements</a>, which is made
     available to car manufacturers, insurance companies, and others.</p>
@@ -360,8 +360,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>It is possible to <a
-    
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
  
+    
href="https://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
  
     take control of some car computers through malware in music files</a>. 
     Also <a
-    href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";>
+    href="https://www.nytimes.com/2011/03/10/business/10hack.html";>
     by radio</a>. More information in <a
     href="http://www.autosec.org/faq.html";> Automotive Security And
@@ -419,5 +419,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2017-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -429,5 +429,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2022/04/13 07:56:41 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-edtech.html malware-edtech.html
--- malware-edtech.html 2022-04-13 04:04:23.089444546 +0000
+++ malware-edtech.html 2022-04-14 04:04:14.895112417 +0000
@@ -171,5 +171,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/";>are
     collecting user's personal and identifiable data</a> including how long
     a call lasts, who's participating in the call, and the IP addresses
@@ -250,5 +250,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/12 08:55:55 $
+$Date: 2022/04/13 07:49:50 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-games.html malware-games.html
--- malware-games.html  2022-04-13 04:04:23.093444546 +0000
+++ malware-games.html  2022-04-14 04:04:14.899112421 +0000
@@ -152,5 +152,5 @@
     competitors further qualifies it as <em>predatory</em>. 
     Note that Belgium <a
-    
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/";>
+    
href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium";>
     made these loot boxes illegal</a> in 2018.</p>
 
@@ -178,5 +178,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A nonfree video game, available through the nonfree Steam client, <a
-    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-cryptocurrency-miners";>
     included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks
     the CPU in users' computers to mine a cryptocurrency.</p>
@@ -188,5 +188,5 @@
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
-    
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+    
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
     shut down the server, and all copies stopped working</a>.</p>
   </li>
@@ -207,5 +207,5 @@
     program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet <a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave";>
+    
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave";>
     to snoop on all open processes running on its user's computer</a>.</p>
   </li>
@@ -254,5 +254,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>nVidia's proprietary GeForce Experience <a
-    
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis";>makes
+    
href="https://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis";>makes
     users identify themselves and then sends personal data about them to
     nVidia servers</a>.</p>
@@ -263,8 +263,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A Capcom's Street Fighter V update <a
-    href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/";>
+    href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/";>
     installed a driver that could be used as a back door by
     any application installed on a Windows computer</a>, but was <a
-    
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack";>
+    
href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack";>
     immediately rolled back</a> in response to public outcry.</p>
   </li>
@@ -294,5 +294,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many <a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/";>
+    
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html";>
     video game consoles snoop on their users and report to the
     internet</a>&mdash;even what their users weigh.</p>
@@ -306,5 +306,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Modern gratis game cr&hellip;apps <a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+    
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
     collect a wide range of data about their users and their users'
     friends and associates</a>.</p>
@@ -370,5 +370,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Angry Birds <a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
+    
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
     spies for companies, and the NSA takes advantage
     to spy through it too</a>.  Here's information on <a
@@ -385,5 +385,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Some proprietary <a
-    
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+    
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
     games lure children to spend their parents' money</a>.</p>
   </li>
@@ -409,5 +409,5 @@
 
     <p>In a court settlement Sony is <a
-    
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+    
href="https://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
     now paying for the sabotage</a>.</p>
   </li>
@@ -474,5 +474,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2016-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -484,5 +484,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/10/30 10:06:56 $
+$Date: 2022/04/13 07:56:41 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-google.html malware-google.html
--- malware-google.html 2022-04-13 04:04:23.333444556 +0000
+++ malware-google.html 2022-04-14 04:04:14.899112421 +0000
@@ -79,5 +79,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>The <a href="https://www.google.com/mobile/android/market-tos.html";>
+    <p>The <a href="https://play.google.com/about/play-terms/";>
     Google Play Terms of Service</a> insist that the user of Android accept
     the presence of universal back doors in apps released by Google.</p>
@@ -95,5 +95,5 @@
     <p>ChromeBooks are programmed for obsolescence:
     ChromeOS has a universal back door that is used for updates and <a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
     ceases to operate at a predefined date</a>. From then on, there
     appears to be no support whatsoever for the computer.</p>
@@ -107,5 +107,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Android has a <a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
+    
href="https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
     back door for remotely changing &ldquo;user&rdquo; settings</a>.</p>
 
@@ -156,5 +156,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google <a
-    
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
+    
href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
     offers censorship software</a>, ostensibly for parents to put into
     their children's computers.</p>
@@ -179,5 +179,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
+    
href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
     Google censored installation of Samsung's ad-blocker</a> on Android
     phones, saying that blocking ads is &ldquo;interference&rdquo; with
@@ -208,5 +208,5 @@
     <p>Google now allows Android
     apps to detect whether a device has been rooted, <a
-    
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>and
+    
href="https://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>and
     refuse to install if so</a>. The Netflix app uses this ability to
     enforce DRM by refusing to install on rooted Android devices.</p>
@@ -223,5 +223,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Chrome <a
-    
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";>implements
+    
href="https://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";>implements
     DRM</a>. So does Chromium, through nonfree software that is effectively
     part of it.</p>
@@ -378,5 +378,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google has long had <a
-    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+    
href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
     back door to remotely unlock an Android device</a>, unless its disk
     is encrypted (possible since Android 5.0 Lollipop, but still not
@@ -429,5 +429,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/";>are
     collecting user's personal and identifiable data</a> including how long
     a call lasts, who's participating in the call, and the IP addresses
@@ -564,5 +564,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Android tracks location for Google <a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
+    
href="https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/";>
     even when &ldquo;location services&rdquo; are turned off, even when
     the phone has no SIM card</a>.</p>
@@ -597,5 +597,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google's new voice messaging app <a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
+    
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
     all conversations</a>.</p>
   </li>
@@ -635,5 +635,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="nest-thermometers">Nest thermometers send <a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a lot of
+    href="https://bgr.com/general/google-nest-jailbreak-hack/";>a lot of
     data about the user</a>.</p>
   </li>
@@ -653,8 +653,8 @@
     <p>Spyware in Android phones (and Windows? laptops): The Wall Street
     Journal (in an article blocked from us by a paywall) reports that <a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
+    
href="https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
     the FBI can remotely activate the GPS and microphone in Android phones
     and laptops</a> (presumably Windows laptops).  Here is <a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
+    href="https://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
   </li>
 
@@ -681,5 +681,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google Play intentionally sends app developers <a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
+    
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
     the personal details of users that install the app</a>.</p>
 
@@ -701,5 +701,5 @@
     <p>Many web sites report all their visitors
     to Google by using the Google Analytics service, which <a
-    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
+    
href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
     tells Google the IP address and the page that was visited</a>.</p>
   </li>
@@ -790,5 +790,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/01/01 17:25:41 $
+$Date: 2022/04/13 07:49:51 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-in-online-conferencing.html 
malware-in-online-conferencing.html
--- malware-in-online-conferencing.html 2022-04-13 04:04:23.333444556 +0000
+++ malware-in-online-conferencing.html 2022-04-14 04:04:14.903112424 +0000
@@ -132,5 +132,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/";>are
     collecting user's personal and identifiable data</a> including how long
     a call lasts, who's participating in the call, and the IP addresses
@@ -201,5 +201,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2020, 2021, 2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -211,5 +211,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/03 06:24:37 $
+$Date: 2022/04/13 07:56:41 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-microsoft.html malware-microsoft.html
--- malware-microsoft.html      2022-04-13 04:04:23.337444555 +0000
+++ malware-microsoft.html      2022-04-14 04:04:14.903112424 +0000
@@ -108,5 +108,5 @@
     <p>In Windows 10, the universal back door
     is no longer hidden; all &ldquo;upgrades&rdquo; will be <a
-    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
+    
href="https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
     forcibly and immediately imposed</a>.</p>
   </li>
@@ -124,5 +124,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The German government <a
-    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/";>veers
+    href="https://www.theregister.com/2013/08/23/nsa_germany_windows_8/";>veers
     away from Windows 8 computers with TPM 2.0</a> (<a
     
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa";>original
@@ -183,5 +183,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2007-08</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
+    <p><a href="https://arstechnica.com/gadgets/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
     href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
@@ -275,5 +275,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A <a
-    
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
+    
href="https://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
     in Internet Explorer and Edge</a> allows an attacker to retrieve
     Microsoft account credentials, if the user is tricked into visiting
@@ -285,5 +285,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+    
href="https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
     Point-of-sale terminals running Windows were taken over</a> and
     turned into a botnet for the purpose of collecting customers' credit
@@ -353,5 +353,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Windows displays <a
-    
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+    
href="https://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
     intrusive ads for Microsoft products and its partners'
     products</a>.</p>
@@ -381,5 +381,5 @@
     it off, in the hope that some day they would fail to say no.
     To do this, Microsoft used <a
-    
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+    
href="https://www.theregister.com/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
     malware techniques</a>.</p>
 
@@ -395,5 +395,5 @@
     <p>Microsoft has made companies'
     Windows machines managed by the company's sysadmins <a
-    
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
+    
href="https://www.computerworld.com/article/3042397/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
     users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
     to Windows 10</a>.</p>
@@ -404,8 +404,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Microsoft has <a
-    
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
+    
href="https://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
     all future Intel CPUs for Windows 7 and 8</a>. Those
     machines will be stuck with the nastier Windows 10.  <a
-    
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
+    
href="https://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
     AMD and Qualcomm CPUs, too</a>.</p>
 
@@ -439,5 +439,5 @@
     program</a> on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
+    
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
     tampering with users' settings and files</a>, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
@@ -464,5 +464,5 @@
     <p>Microsoft has made Windows 7
     and 8 cease to function on certain new computers, <a
-    
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
+    
href="https://docs.microsoft.com/en-US/troubleshoot/windows-client/deployment/processor-not-supported-together-with-windows-version";>effectively
     forcing their owners to switch to Windows 10</a>.</p>
   </li>
@@ -492,9 +492,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
-    
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
+    
href="https://www.theregister.com/2016/06/03/windows_10_upgrade_satellite_link/";>
     jeopardize important operations in regions of the world with poor
     connectivity</a>, but many of the people who let installation proceed
     found out that this &ldquo;upgrade&rdquo; was in fact a <a
-    
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    
href="https://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
     downgrade</a>.</p>
   </li>
@@ -505,5 +505,5 @@
     <p>Once Microsoft has tricked a user
     into accepting installation of Windows 10, <a
-    
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+    
href="https://www.theregister.com/2016/06/01/windows_10_nagware_no_way_out/";>they
     find that they are denied the option to cancel or even postpone the
     imposed date of installation</a>.</p>
@@ -519,8 +519,8 @@
     <p>FTDI's proprietary driver
     for its USB-to-serial chips has been designed to <a
-    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
+    
href="https://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
     alternative compatible chips</a>
     so that they no longer work. Microsoft is <a
-    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
+    
href="https://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
     this automatically</a> as an &ldquo;upgrade&rdquo;.</p>
   </li>
@@ -628,5 +628,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/";>are
     collecting user's personal and identifiable data</a> including how long
     a call lasts, who's participating in the call, and the IP addresses
@@ -699,5 +699,5 @@
     fourth stable build of Windows 10, called the
     &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a
-    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
+    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/";>
     by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
 
@@ -724,5 +724,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>By default, Windows 10 <a
-    
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
+    
href="https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/";>sends
     debugging information to Microsoft, including core dumps</a>. Microsoft
     now distributes them to another company.</p>
@@ -761,5 +761,5 @@
     applications.  Then another downgrade inserted a general spying
     program.  Users noticed this and complained, so Microsoft renamed it <a
-    
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+    
href="https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
     to give users the impression it was gone</a>.</p>
 
@@ -771,5 +771,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
+    
href="https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
     Windows 10 sends identifiable information to Microsoft</a>, even if
     a user turns off its Bing search and Cortana features, and activates
@@ -818,5 +818,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>It only gets worse with time.  <a
-    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+    
href="https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
     Windows 10 requires users to give permission for total snooping</a>,
     including their files, their commands, their text input, and their
@@ -839,5 +839,5 @@
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
     Microsoft changed Skype <a
-    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+    
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
     specifically for spying</a>.</p>
   </li>
@@ -847,5 +847,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Spyware in older versions of Windows: <a
-    href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+    href="https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/";>
     Windows Update snoops on the user</a>. <a
     
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
@@ -867,5 +867,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The recent versions of Microsoft Office require the user to <a
-    
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+    
href="https://www.microsoft.com/en-us/microsoft-365/microsoft-365-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
     connect to Microsoft servers at least every thirty-one
     days</a>. Otherwise, the software will refuse to edit any documents
@@ -916,5 +916,5 @@
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
-    
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+    
href="https://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
     &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall
     to call this &ldquo;protecting&rdquo; the users.  The article talks
@@ -926,5 +926,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2011-10</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
+    <p><a href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
     Mobile devices that come with Windows 8 are tyrants</a>.</p>
   </li>
@@ -994,5 +994,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/05 18:50:47 $
+$Date: 2022/04/13 08:51:18 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-mobiles.html malware-mobiles.html
--- malware-mobiles.html        2022-04-13 04:04:23.341444556 +0000
+++ malware-mobiles.html        2022-04-14 04:04:14.907112428 +0000
@@ -102,5 +102,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The phone network <a
-    href="https://ssd.eff.org/en/module/problem-mobile-phones";>
+    href="https://ssd.eff.org/en/playlist/privacy-breakdown-mobile-phones";>
     tracks the movements of each phone</a>.</p>
 
@@ -243,5 +243,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
+    
href="https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
     A Chinese version of Android has a universal back door</a>. Nearly
     all models of mobile phones have a <a 
href="#universal-back-door-phone-modem">
@@ -292,5 +292,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="netflix-app-geolocation-drm">The Netflix Android app <a
-    
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
+    
href="https://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
     forces the use of Google DNS</a>. This is one of the methods that
     Netflix uses to enforce the geolocation restrictions dictated by the
@@ -327,5 +327,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Siri, Alexa, and all the other voice-control systems can be <a
-    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
+    
href="https://www.fastcompany.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
     hijacked by programs that play commands in ultrasound that humans
     can't hear</a>.</p>
@@ -344,5 +344,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many Android devices <a
-    
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/";>
+    
href="https://arstechnica.com/information-technology/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/";>
     can be hijacked through their Wi-Fi chips</a> because of a bug in
     Broadcom's nonfree firmware.</p>
@@ -409,5 +409,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A half-blind security critique of a tracking app: it found that <a
-    
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/";>
+    
href="https://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats-a1100919965/";>
     blatant flaws allowed anyone to snoop on a user's personal data</a>.
     The critique fails entirely to express concern that the app sends the
@@ -424,5 +424,5 @@
     <p>A bug in a proprietary ASN.1 library, used
     in cell phone towers as well as cell phones and routers, <a
-    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover";>allows
+    
href="https://arstechnica.com/information-technology/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover/";>allows
     taking control of those systems</a>.</p>
   </li>
@@ -432,5 +432,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many proprietary payment apps <a
-    
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data";>transmit
+    
href="https://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data";>transmit
     personal data in an insecure way</a>. However,
     the worse aspect of these apps is that <a
@@ -443,5 +443,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
+    
href="https://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
     Many smartphone apps use insecure authentication methods when storing
     your personal data on remote servers</a>. This leaves personal
@@ -456,5 +456,5 @@
     <p>An app to prevent &ldquo;identity theft&rdquo;
     (access to personal data) by storing users' data on a special server <a
-    
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>was
+    
href="https://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>was
     deactivated by its developer</a> which had discovered a security
     flaw.</p>
@@ -471,5 +471,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The <a
-    
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/";>insecurity
+    
href="https://arstechnica.com/information-technology/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/";>insecurity
     of WhatsApp</a> makes eavesdropping a snap.</p>
   </li>
@@ -903,10 +903,10 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The AppCensus database gives information on <a
-    href="https://www.appcensus.mobi";> how Android apps use and
+    href="https://www.appcensus.io/";> how Android apps use and
     misuse users' personal data</a>. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the <a
     href="/proprietary/proprietary-surveillance.html#M201812290">
     Advertising ID</a> to other companies, and <a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/";>
+    href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/";>
     18,000 (23% of the total) link this ID to hardware identifiers</a>,
     so that users cannot escape tracking by resetting it.</p>
@@ -933,5 +933,5 @@
     <p>An investigation of the 150 most popular
     gratis VPN apps in Google Play found that <a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/";>
+    
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/";>
     25% fail to protect their users' privacy</a> due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
@@ -941,5 +941,5 @@
 
     <p>Moreover, a previous investigation had found that <a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/";>half of
+    
href="https://www.top10vpn.com/research/free-vpn-investigations/ownership/";>half
 of
     the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
 
@@ -998,5 +998,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Some Android apps <a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
+    
href="https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
     track the phones of users that have deleted them</a>.</p>
   </li>
@@ -1099,5 +1099,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>20 dishonest Android apps recorded <a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>phone
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/";>phone
     calls and sent them and text messages and emails to snoopers</a>.</p>
 
@@ -1225,5 +1225,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A <a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
+    
href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
     research paper</a> that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
@@ -1281,5 +1281,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Facebook's new Magic Photo app <a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>
+    
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/";>
     scans your mobile phone's photo collections for known faces</a>,
     and suggests you circulate the picture you take according to who is
@@ -1309,5 +1309,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A pregnancy test controller application not only can <a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
     spy on many sorts of data in the phone, and in server accounts,
     it can alter them too</a>.</p>
@@ -1329,5 +1329,5 @@
     <p>The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is <a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html";>
+    href="https://news.northwestern.edu/stories/2016/01/fool-activity-tracker";>
     proprietary software to make sure they can't &ldquo;fool&rdquo;
     the monitoring</a>.</p>
@@ -1339,5 +1339,5 @@
     <p>&ldquo;Cryptic communication,&rdquo;
     unrelated to the app's functionality, was <a
-    href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+    href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
     found in the 500 most popular gratis Android apps</a>.</p>
 
@@ -1365,5 +1365,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>According to Edward Snowden, <a
-    href="http://www.bbc.com/news/uk-34444233";>agencies can take over
+    href="https://www.bbc.com/news/uk-34444233";>agencies can take over
     smartphones</a> by sending hidden text messages which enable
     them to turn the phones on and off, listen to the microphone,
@@ -1379,10 +1379,10 @@
     <p>Like most &ldquo;music screaming&rdquo; disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it <a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy";>
+    
href="https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy";>
     demanded users submit to increased snooping</a>, and some are starting
     to realize that it is nasty.</p>
 
     <p>This article shows the <a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
+    href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/";>
     twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better</a>&mdash;never mind whether they want that. This is a
@@ -1397,5 +1397,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Samsung phones come with <a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>apps
+    
href="https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>apps
     that users can't delete</a>, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
@@ -1425,5 +1425,5 @@
     <p>Gratis Android apps (but not <a
     href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>tracking
+    
href="https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>tracking
     and advertising</a> URLs, on the average.</p>
   </li>
@@ -1433,5 +1433,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Widely used <a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/";>proprietary
+    
href="https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/";>proprietary
     QR-code scanner apps snoop on the user</a>. This is in addition to
     the snooping done by the phone company, and perhaps by the OS in
@@ -1448,5 +1448,5 @@
     <p>Many proprietary apps for mobile devices
     report which other apps the user has installed.  <a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
+    href="https://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
     is doing this in a way that at least is visible and optional</a>. Not
     as bad as what the others do.</p>
@@ -1473,5 +1473,5 @@
     <p>The nonfree Snapchat app's principal purpose is to restrict the
     use of data on the user's computer, but it does surveillance too: <a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
+    
href="https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
     it tries to get the user's list of other people's phone
     numbers</a>.</p>
@@ -1482,5 +1482,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Brightest Flashlight app <a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
+    
href="https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
     sends user data, including geolocation, for use by companies</a>.</p>
 
@@ -1497,5 +1497,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Portable phones with GPS <a
-    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
+    
href="https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked";>
     will send their GPS location on remote command, and users cannot stop
     them</a>. (The US says it will eventually require all new portable phones
@@ -1507,6 +1507,6 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>FTC says most mobile apps for children don't respect privacy: <a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+    
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
+    
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
   </li>
 
@@ -1515,5 +1515,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Some manufacturers add a <a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
+    
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
     hidden general surveillance package such as Carrier IQ</a>.</p>
   </li>
@@ -1546,5 +1546,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2011-10</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
+    <p><a href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
     Mobile devices that come with Windows 8 are tyrants</a>.</p>
   </li>
@@ -1610,5 +1610,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/05 18:50:47 $
+$Date: 2022/04/13 12:46:51 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-webpages.html malware-webpages.html
--- malware-webpages.html       2022-04-13 04:04:23.341444556 +0000
+++ malware-webpages.html       2022-04-14 04:04:14.911112432 +0000
@@ -70,5 +70,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    
href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
     to snoop on information that users have typed into a
     form but not sent</a>, in order to learn their identity. Some are <a
@@ -103,5 +103,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A cracker used an exploit in outdated software to <a
-    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+    
href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors";>
     inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
     type of malware hijacks the computer's processor to mine a
@@ -146,5 +146,5 @@
     <p>When a page uses Disqus
     for comments, the proprietary Disqus software <a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook";>loads
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/";>loads
     a Facebook software package into the browser of every anonymous visitor
     to the page, and makes the page's URL available to Facebook</a>.</p>
@@ -165,5 +165,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A <a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
+    
href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
     research paper</a> that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
@@ -195,5 +195,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>E-books can contain JavaScript code, and <a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
+    
href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
     sometimes this code snoops on readers</a>.</p>
   </li>
@@ -203,5 +203,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Flash and JavaScript are used for <a
-    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
+    
href="https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
     &ldquo;fingerprinting&rdquo; devices</a> to identify users.</p>
   </li>
@@ -222,5 +222,5 @@
     <p>Many web sites report all their visitors
     to Google by using the Google Analytics service, which <a
-    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
+    
href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
     tells Google the IP address and the page that was visited</a>.</p>
   </li>
@@ -301,5 +301,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2017-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -311,5 +311,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/25 05:52:32 $
+$Date: 2022/04/13 07:56:41 $
 <!-- timestamp end -->
 </p>
diff -rNU2 potential-malware.html potential-malware.html
--- potential-malware.html      2022-04-13 04:04:23.345444556 +0000
+++ potential-malware.html      2022-04-14 04:04:14.911112432 +0000
@@ -123,5 +123,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Patent applications show that Google and Amazon are interested in <a
-    
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
+    
href="https://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
     making &ldquo;digital assistants&rdquo; study people's activities to
     learn all about them</a>.</p>
@@ -141,5 +141,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Any device that has a microphone and a speaker could be <a
-    
href="http://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/";>turned
+    
href="https://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/";>turned
     into a sonar system that would track the movements of people in the
     same room or other rooms nearby</a>.</p>
@@ -196,5 +196,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2017-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -206,5 +206,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 07:13:04 $
+$Date: 2022/04/13 07:56:41 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-addictions.html proprietary-addictions.html
--- proprietary-addictions.html 2022-04-13 04:04:23.349444556 +0000
+++ proprietary-addictions.html 2022-04-14 04:04:14.915112435 +0000
@@ -264,5 +264,5 @@
     competitors further qualifies it as <em>predatory</em>. 
     Note that Belgium <a
-    
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/";>
+    
href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium";>
     made these loot boxes illegal</a> in 2018.</p>
 
@@ -398,5 +398,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2019, 2020, 2021, 2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -408,5 +408,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/10/30 10:06:56 $
+$Date: 2022/04/13 07:56:42 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-back-doors.html proprietary-back-doors.html
--- proprietary-back-doors.html 2022-04-13 04:04:23.349444556 +0000
+++ proprietary-back-doors.html 2022-04-14 04:04:14.919112439 +0000
@@ -98,5 +98,5 @@
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, and <a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
+    
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
     there is no way to delete these accounts either</a>.</p>
 
@@ -133,5 +133,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple can, and regularly does, <a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+    
href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
     remotely extract some data from iPhones for the state</a>.</p>
 
@@ -139,5 +139,5 @@
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
     iOS 8 security improvements</a>; but <a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
+    href="https://theintercept.com/2014/09/22/apple-data/";>
     not as much as Apple claims</a>.</p>
   </li>
@@ -180,5 +180,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Android has a <a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
+    
href="https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
     back door for remotely changing &ldquo;user&rdquo; settings</a>.</p>
 
@@ -200,5 +200,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A pregnancy test controller application not only can <a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
     spy on many sorts of data in the phone, and in server accounts,
     it can alter them too</a>.</p>
@@ -209,9 +209,9 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
+    
href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
     Some D-Link routers</a> have a back door for changing settings in a
     dlink of an eye.</p>
 
-    <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";> The TP-Link
+    <p><a href="https://sekurak.pl/tp-link-httptftp-backdoor/";> The TP-Link
     router has a back door</a>.</p>
 
@@ -224,5 +224,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google has long had <a
-    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+    
href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
     back door to remotely unlock an Android device</a>, unless its disk
     is encrypted (possible since Android 5.0 Lollipop, but still not
@@ -234,5 +234,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Caterpillar vehicles come with <a
-    
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
+    
href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
     a back door to shutoff the engine</a> remotely.</p>
   </li>
@@ -242,5 +242,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Modern gratis game cr&hellip;apps <a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+    
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
     collect a wide range of data about their users and their users'
     friends and associates</a>.</p>
@@ -273,5 +273,5 @@
     <p id="swindle-eraser">The Amazon
     Kindle-Swindle has a back door that has been used to <a
-    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+    
href="https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
     remotely erase books</a>.  One of the books erased was
     <cite>1984</cite>, by George Orwell.</p>
@@ -280,5 +280,5 @@
     would delete books only following orders from the
     state.  However, that policy didn't last.  In 2012 it <a
-    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
+    
href="https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
     wiped a user's Kindle-Swindle and deleted her account</a>, then
     offered her kafkaesque &ldquo;explanations.&rdquo;</p>
@@ -293,5 +293,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The iPhone has a back door for <a
-    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+    
href="https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
     remote wipe</a>.  It's not always enabled, but users are led into
     enabling it without understanding.</p>
@@ -500,5 +500,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The iPhone has a back door <a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+    
href="https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
     that allows Apple to remotely delete apps</a> which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
@@ -609,5 +609,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>The <a href="https://www.google.com/mobile/android/market-tos.html";>
+    <p>The <a href="https://play.google.com/about/play-terms/";>
     Google Play Terms of Service</a> insist that the user of Android accept
     the presence of universal back doors in apps released by Google.</p>
@@ -664,5 +664,5 @@
     <p>ChromeBooks are programmed for obsolescence:
     ChromeOS has a universal back door that is used for updates and <a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
     ceases to operate at a predefined date</a>. From then on, there
     appears to be no support whatsoever for the computer.</p>
@@ -676,5 +676,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The FordPass Connect feature of some Ford vehicles has <a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+    
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
     near-complete access to the internal car network</a>. It is constantly
     connected to the cellular phone network and sends Ford a lot of data,
@@ -703,5 +703,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Furby Connect has a <a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
+    
href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
     universal back door</a>. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
@@ -738,5 +738,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio &ldquo;smart&rdquo; TVs <a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
+    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
     have a universal back door</a>.</p>
   </li>
@@ -772,5 +772,5 @@
     <p>In Windows 10, the universal back door
     is no longer hidden; all &ldquo;upgrades&rdquo; will be <a
-    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
+    
href="https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
     forcibly and immediately imposed</a>.</p>
   </li>
@@ -792,5 +792,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
+    
href="https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
     A Chinese version of Android has a universal back door</a>. Nearly
     all models of mobile phones have a <a 
href="#universal-back-door-phone-modem">
@@ -846,5 +846,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
-    
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
+    href="https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/";>
     unintended back doors</a> too.</p>
   </li>
@@ -854,8 +854,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A Capcom's Street Fighter V update <a
-    href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/";>
+    href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/";>
     installed a driver that could be used as a back door by
     any application installed on a Windows computer</a>, but was <a
-    
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack";>
+    
href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack";>
     immediately rolled back</a> in response to public outcry.</p>
   </li>
@@ -866,5 +866,5 @@
     <p>Dell computers, shipped with
     Windows, had a bogus root certificate that <a
-    
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
+    
href="https://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
     allowed anyone (not just Dell) to remotely authorize any software to
     run</a> on the computer.</p>
@@ -902,5 +902,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Here is a big problem whose details are still secret: <a
-    href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/";>
+    href="https://mashable.com/archive/fbi-microsoft-bitlocker-backdoor";>
     The FBI asks lots of companies to put back doors in proprietary
     programs</a>. We don't know of specific cases where this was done,
@@ -912,5 +912,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The German government <a
-    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/";>veers
+    href="https://www.theregister.com/2013/08/23/nsa_germany_windows_8/";>veers
     away from Windows 8 computers with TPM 2.0</a> (<a
     
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa";>original
@@ -982,5 +982,5 @@
 </div>
 
-<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -992,5 +992,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/19 08:18:48 $
+$Date: 2022/04/13 09:28:11 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-censorship.html proprietary-censorship.html
--- proprietary-censorship.html 2022-04-13 04:04:23.353444557 +0000
+++ proprietary-censorship.html 2022-04-14 04:04:14.919112439 +0000
@@ -81,5 +81,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google <a
-    
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
+    
href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
     offers censorship software</a>, ostensibly for parents to put into
     their children's computers.</p>
@@ -104,5 +104,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
+    
href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
     Google censored installation of Samsung's ad-blocker</a> on Android
     phones, saying that blocking ads is &ldquo;interference&rdquo; with
@@ -222,5 +222,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -232,5 +232,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/03 06:24:37 $
+$Date: 2022/04/13 07:56:42 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-coverups.html proprietary-coverups.html
--- proprietary-coverups.html   2022-04-13 04:04:23.533444563 +0000
+++ proprietary-coverups.html   2022-04-14 04:04:14.923112442 +0000
@@ -69,5 +69,5 @@
     <p>Price Waterhouse Coopers tried
     to suppress knowledge of a security flaw by <a
-    
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/";>
+    
href="https://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/";>
     making legal threats against the security company that found
     it</a>.</p>
@@ -124,5 +124,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2017-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -134,5 +134,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2022/04/13 07:56:42 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-deception.html proprietary-deception.html
--- proprietary-deception.html  2022-04-13 04:04:23.537444563 +0000
+++ proprietary-deception.html  2022-04-14 04:04:14.927112446 +0000
@@ -104,5 +104,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="M201509210">Volkswagen programmed its car engine computers to <a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
+    href="https://petri.com/volkswagen-used-software-to-cheat-on-emissions/";>
     detect the Environmental Protection Agency's emission tests</a>, and
     run dirty the rest of the time. In real driving, the cars exceeded
@@ -151,5 +151,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
+    
href="https://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
     Audi's proprietary software used a simple method to cheat on emissions
     tests</a>: to activate a special low-emission gearshifting mode until
@@ -161,5 +161,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many proprietary programs secretly <a
-    
href="https://www.theregister.co.uk/2016/08/05/payperinstall_study/";>install
+    href="https://www.theregister.com/2016/08/05/payperinstall_study/";>install
     other proprietary programs that the users don't want</a>.</p>
   </li>
@@ -179,5 +179,5 @@
     <p>A top-ranking proprietary Instagram client promising
     to tell users who's been watching their pictures was in reality <a
-    
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords";>stealing
+    
href="https://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords";>stealing
     their credentials</a>, advertising itself on their feed, and posting
     images without their consent.</p>
@@ -244,5 +244,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/06 07:57:27 $
+$Date: 2022/04/13 07:49:52 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-drm.html proprietary-drm.html
--- proprietary-drm.html        2022-04-13 04:04:23.541444563 +0000
+++ proprietary-drm.html        2022-04-14 04:04:14.927112446 +0000
@@ -224,5 +224,5 @@
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
-    
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+    
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
     shut down the server, and all copies stopped working</a>.</p>
   </li>
@@ -242,5 +242,5 @@
     <p>Google now allows Android
     apps to detect whether a device has been rooted, <a
-    
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>and
+    
href="https://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>and
     refuse to install if so</a>. The Netflix app uses this ability to
     enforce DRM by refusing to install on rooted Android devices.</p>
@@ -298,5 +298,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Chrome <a
-    
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";>implements
+    
href="https://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";>implements
     DRM</a>. So does Chromium, through nonfree software that is effectively
     part of it.</p>
@@ -328,5 +328,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The <a
-    href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
+    href="https://michaelweinberg.org/post/137045828005/free-the-cube";>
     &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it
     won't accept third-party printing materials.  It is the Keurig of
@@ -336,5 +336,5 @@
 
     <p>With a <a
-    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+    href="https://www.fsf.org/resources/hw/endorsement/aleph-objects";>
     printer that gets the Respects Your Freedom</a>, this problem would
     not even be a remote possibility.</p>
@@ -363,5 +363,5 @@
     <p>Philips &ldquo;smart&rdquo; lightbulbs had initially been
     designed to interact with other companies' smart light bulbs, but <a
-    
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+    
href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/";>
     later the company updated the firmware to disallow
     interoperability</a>.</p>
@@ -375,5 +375,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="netflix-app-geolocation-drm">The Netflix Android app <a
-    
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
+    
href="https://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
     forces the use of Google DNS</a>. This is one of the methods that
     Netflix uses to enforce the geolocation restrictions dictated by the
@@ -402,5 +402,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="bluray"><a
-    
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
+    
href="https://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
     DVDs and Bluray disks have DRM</a>.</p>
 
@@ -482,5 +482,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2007-08</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
+    <p><a href="https://arstechnica.com/gadgets/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
     href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
@@ -558,5 +558,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/12 12:48:54 $
+$Date: 2022/04/13 07:49:52 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-fraud.html proprietary-fraud.html
--- proprietary-fraud.html      2022-04-13 04:04:23.545444564 +0000
+++ proprietary-fraud.html      2022-04-14 04:04:14.931112449 +0000
@@ -102,5 +102,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A game published on Facebook <a
-    
href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>aimed
+    
href="https://revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>aimed
     at leading children to spend</a> large amounts of their parents'
     money without explaining it to them.</p>
@@ -111,5 +111,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Some proprietary <a
-    
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+    
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
     games lure children to spend their parents' money</a>.</p>
   </li>
@@ -165,5 +165,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2019, 2020, 2021, 2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -175,5 +175,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/10/30 16:45:35 $
+$Date: 2022/04/13 07:56:42 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2022-04-13 04:04:23.553444564 +0000
+++ proprietary-insecurity.html 2022-04-14 04:04:14.939112456 +0000
@@ -344,5 +344,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple has <a
-    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours/";>implemented
     a malware in its computers that imposes surveillance</a> on users
     and reports users' computing to Apple.</p>
@@ -487,5 +487,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Medtronics Conexus Telemetry Protocol has <a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+    
href="https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
     two vulnerabilities that affect several models of implantable
     defibrillators</a> and the devices they connect to.</p>
@@ -518,5 +518,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Researchers have discovered how to <a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
+    
href="https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
     hide voice commands in other audio</a>, so that people cannot hear
     them, but Alexa and Siri can.</p>
@@ -554,5 +554,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Siri, Alexa, and all the other voice-control systems can be <a
-    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
+    
href="https://www.fastcompany.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
     hijacked by programs that play commands in ultrasound that humans
     can't hear</a>.</p>
@@ -583,5 +583,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
-    
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
+    href="https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/";>
     unintended back doors</a> too.</p>
   </li>
@@ -591,5 +591,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon recently invited consumers to be suckers and <a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
+    
href="https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/";>
     allow delivery staff to open their front doors</a>. Wouldn't you know
     it, the system has a grave security flaw.</p>
@@ -609,5 +609,5 @@
     <p>A &ldquo;smart&rdquo; intravenous pump
     designed for hospitals is connected to the internet. Naturally <a
-    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
+    
href="https://www.techdirt.com/2017/09/22/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack/";>
     its security has been cracked</a>.</p>
 
@@ -621,5 +621,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The bad security in many Internet of Stings devices allows <a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+    
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/";>ISPs
     to snoop on the people that use them</a>.</p>
 
@@ -639,5 +639,5 @@
     <p>That is a malicious functionality, but in addition it
     is a gross insecurity since anyone, including malicious crackers, <a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>can
+    
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>can
     find those accounts and use them to get into users' cameras</a>.</p>
   </li>
@@ -648,10 +648,10 @@
     <p id="intel-me-10-year-vulnerability">Intel's
     CPU backdoor&mdash;the Intel Management Engine&mdash;had a <a
-    
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>major
+    
href="https://arstechnica.com/information-technology/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>major
     security vulnerability for 10 years</a>.</p>
 
     <p>The vulnerability allowed a cracker to access
     the computer's Intel Active Management Technology (AMT) <a
-    
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>
+    
href="https://arstechnica.com/information-technology/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>
     web interface with an empty password and gave administrative
     access</a> to access the computer's keyboard, mouse, monitor among
@@ -669,5 +669,5 @@
     <p>The proprietary code that runs pacemakers,
     insulin pumps, and other medical devices is <a
-    href="http://www.bbc.co.uk/news/technology-40042584";> full of gross
+    href="https://www.bbc.com/news/technology-40042584";> full of gross
     security faults</a>.</p>
   </li>
@@ -680,5 +680,5 @@
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, <a
-    
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";>according
+    
href="https://www.modzero.com/advisories/MZ-17-01-Conexant-Keylogger.txt";>according
     to modzero</a> the &ldquo;information-leak via Covert Storage Channel
     enables malware authors to capture keystrokes without taking the risk
@@ -699,5 +699,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many Android devices <a
-    
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/";>
+    
href="https://arstechnica.com/information-technology/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/";>
     can be hijacked through their Wi-Fi chips</a> because of a bug in
     Broadcom's nonfree firmware.</p>
@@ -735,5 +735,5 @@
     <p>If you buy a used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually <a
-    
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>the
+    
href="https://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>the
     previous owners can still remotely control it</a>.</p>
   </li>
@@ -792,5 +792,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/";>remotely
     controlled with a mobile phone</a>; physical access is not
     necessary. This would enable crackers to listen in on a child's
@@ -805,5 +805,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>4G LTE phone networks are drastically insecure. They can be <a
-    
href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/";>
+    
href="https://www.theregister.com/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/";>
     taken over by third parties and used for man-in-the-middle
     attacks</a>.</p>
@@ -814,5 +814,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Due to weak security, <a
-    
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>it
+    
href="https://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>it
     is easy to open the doors of 100 million cars built by
     Volkswagen</a>.</p>
@@ -832,5 +832,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A <a
-    
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
+    
href="https://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
     in Internet Explorer and Edge</a> allows an attacker to retrieve
     Microsoft account credentials, if the user is tricked into visiting
@@ -861,5 +861,5 @@
     <p>A bug in a proprietary ASN.1 library, used
     in cell phone towers as well as cell phones and routers, <a
-    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover";>allows
+    
href="https://arstechnica.com/information-technology/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover/";>allows
     taking control of those systems</a>.</p>
   </li>
@@ -879,5 +879,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a
-    
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
+    
href="https://arstechnica.com/information-technology/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
     unauthorized people can remotely control it</a>.</p>
 
@@ -924,5 +924,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many proprietary payment apps <a
-    
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data";>transmit
+    
href="https://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data";>transmit
     personal data in an insecure way</a>. However,
     the worse aspect of these apps is that <a
@@ -968,5 +968,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>FitBit fitness trackers have a <a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+    
href="https://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
     Bluetooth vulnerability</a> that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
@@ -988,5 +988,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Security researchers discovered a <a
-    
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
+    
href="https://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
     vulnerability in diagnostic dongles used for vehicle tracking and
     insurance</a> that let them take remote control of a car or lorry
@@ -998,5 +998,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Crackers were able to <a
-    
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
+    
href="https://arstechnica.com/information-technology/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
     take remote control of the Jeep</a> &ldquo;connected car&rdquo;. They
     could track the car, start or stop the engine, and activate or
@@ -1013,5 +1013,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Due to bad security in a drug pump, crackers could use it to <a
-    
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
+    
href="https://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
     kill patients</a>.</p>
   </li>
@@ -1021,5 +1021,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
+    
href="https://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
     Many smartphone apps use insecure authentication methods when storing
     your personal data on remote servers</a>. This leaves personal
@@ -1056,5 +1056,5 @@
     <p>An app to prevent &ldquo;identity theft&rdquo;
     (access to personal data) by storing users' data on a special server <a
-    
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>was
+    
href="https://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>was
     deactivated by its developer</a> which had discovered a security
     flaw.</p>
@@ -1071,5 +1071,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Lots of <a
-    href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
+    href="https://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
     hospital equipment has lousy security</a>, and it can be fatal.</p>
   </li>
@@ -1079,5 +1079,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The <a
-    
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/";>insecurity
+    
href="https://arstechnica.com/information-technology/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/";>insecurity
     of WhatsApp</a> makes eavesdropping a snap.</p>
   </li>
@@ -1086,5 +1086,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="http://www.bunniestudios.com/blog/?p=3554";> Some flash
+    <p><a href="https://www.bunniestudios.com/blog/?p=3554";> Some flash
     memories have modifiable software</a>, which makes them vulnerable
     to viruses.</p>
@@ -1100,5 +1100,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+    
href="https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
     Point-of-sale terminals running Windows were taken over</a> and
     turned into a botnet for the purpose of collecting customers' credit
@@ -1124,5 +1124,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
+    
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
     NSA has put back doors into nonfree encryption software</a>. We don't
     know which ones they are, but we can be sure they include some widely
@@ -1135,5 +1135,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The FTC punished a company for making webcams with <a
-    
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
+    
href="https://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
     bad security so that it was easy for anyone to watch through
     them</a>.</p>
@@ -1153,8 +1153,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p> It is possible to <a
-    
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
+    
href="https://siliconangle.com/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
     kill people by taking control of medical
     implants by radio</a>.  More information in <a
-    href="http://www.bbc.co.uk/news/technology-17631838";>BBC
+    href="https://www.bbc.com/news/technology-17631838";>BBC
     News</a> and <a
     
href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/";>
@@ -1166,5 +1166,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
+    
href="https://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
     &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to
     intrusion.</p>
@@ -1184,8 +1184,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>It is possible to <a
-    
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
  
+    
href="https://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
  
     take control of some car computers through malware in music files</a>. 
     Also <a
-    href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";>
+    href="https://www.nytimes.com/2011/03/10/business/10hack.html";>
     by radio</a>. More information in <a
     href="http://www.autosec.org/faq.html";> Automotive Security And
@@ -1253,5 +1253,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/05 18:50:48 $
+$Date: 2022/04/13 07:49:53 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-interference.html proprietary-interference.html
--- proprietary-interference.html       2022-04-13 04:04:23.653444568 +0000
+++ proprietary-interference.html       2022-04-14 04:04:14.939112456 +0000
@@ -287,5 +287,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A nonfree video game, available through the nonfree Steam client, <a
-    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-cryptocurrency-miners";>
     included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks
     the CPU in users' computers to mine a cryptocurrency.</p>
@@ -296,5 +296,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A cracker used an exploit in outdated software to <a
-    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+    
href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors";>
     inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
     type of malware hijacks the computer's processor to mine a
@@ -351,5 +351,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Windows displays <a
-    
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+    
href="https://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
     intrusive ads for Microsoft products and its partners'
     products</a>.</p>
@@ -387,5 +387,5 @@
     it off, in the hope that some day they would fail to say no.
     To do this, Microsoft used <a
-    
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+    
href="https://www.theregister.com/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
     malware techniques</a>.</p>
 
@@ -401,5 +401,5 @@
     <p>Microsoft has made companies'
     Windows machines managed by the company's sysadmins <a
-    
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
+    
href="https://www.computerworld.com/article/3042397/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
     users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
     to Windows 10</a>.</p>
@@ -422,8 +422,8 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Microsoft has <a
-    
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
+    
href="https://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
     all future Intel CPUs for Windows 7 and 8</a>. Those
     machines will be stuck with the nastier Windows 10.  <a
-    
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
+    
href="https://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
     AMD and Qualcomm CPUs, too</a>.</p>
 
@@ -444,5 +444,5 @@
     <p>Adobe nonfree software may halt
     all other work and freeze a computer <a
-    href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
+    href="https://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
     to perform a license check</a>, at a random time every 30 days.</p>
   </li>
@@ -452,5 +452,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Oracle made a deal with Yahoo; Oracle's nonfree Java plug-in will <a
-    
href="http://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097";>
+    
href="https://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097";>
     change the user's initial web page, and default search engine, to
     Yahoo</a> unless the user intervenes to stop it.</p>
@@ -517,5 +517,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/04 08:04:09 $
+$Date: 2022/04/13 07:49:53 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-jails.html proprietary-jails.html
--- proprietary-jails.html      2022-04-13 04:04:23.653444568 +0000
+++ proprietary-jails.html      2022-04-14 04:04:14.943112461 +0000
@@ -128,5 +128,5 @@
 
     <p>Here is an article about the <a
-    href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
+    href="https://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
     code signing</a> that the iThings use to lock up the user.</p>
 
@@ -235,5 +235,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple used its censorship system to enforce Russian surveillance <a
-    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>
+    
href="https://web.archive.org/web/20220402210254/https://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html";>
     by blocking distribution of the LinkedIn app in Russia</a>.</p>
 
@@ -259,5 +259,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple censors games, <a
-    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
+    
href="https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/";>
     banning some games from the cr&hellip;app store</a> because of which
     political points they suggest. Some political points are apparently
@@ -268,5 +268,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
+    <p>Apple <a href="https://www.ifixit.com/News/7401/ifixit-app-pulled";>
     banned a program from the App Store</a> because its developers
     committed the enormity of disassembling some iThings.</p>
@@ -277,10 +277,10 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>As of 2015, Apple <a
-    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
+    
href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
     systematically bans apps that endorse abortion rights or would help
     women find abortions</a>.</p>
 
     <p>This particular political slant <a
-    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
+    
href="https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
     affects other Apple services</a>.</p>
   </li>
@@ -291,5 +291,5 @@
     <p>Apple has banned iThing
     applications that show the confederate flag.  <a
-    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
+    href="https://www.huffpost.com/entry/apple-confederate-flag_n_7663754";>
     Not only those that use it as a symbol of racism</a>, but even
     strategic games that use it to represent confederate army units
@@ -308,5 +308,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
+    
href="https://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
     More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
   </li>
@@ -316,7 +316,7 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple used this censorship power in 2014 to <a
-    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
+    
href="https://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
     ban all bitcoin apps</a> for the iThings for a time.  It also <a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
+    
href="https://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
     banned a game about growing marijuana</a>, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
@@ -331,5 +331,5 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple <a
-    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>
+    href="https://mashable.com/archive/apple-app-tracks-drone-strikes";>
     admitted it was censoring the app based on the subject matter</a>.</p>
   </li>
@@ -382,5 +382,5 @@
     removed the ability to install other operating
     systems</a>. Then users broke that restriction too, but <a
-    
href="https://www.engadget.com/2011/01/12/sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps/";>got
+    
href="https://www.engadget.com/2011-01-12-sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps.html";>got
     sued by Sony</a>.</p>
   </li>
@@ -457,5 +457,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/01/11 07:27:02 $
+$Date: 2022/04/13 07:49:53 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-manipulation.html proprietary-manipulation.html
--- proprietary-manipulation.html       2022-04-13 04:04:23.657444568 +0000
+++ proprietary-manipulation.html       2022-04-14 04:04:14.947112464 +0000
@@ -157,5 +157,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Jibo robot toys were tethered to the manufacturer's server,
-    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    and <a 
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648";>
     the company made them all cease to work</a> by shutting down that
     server.</p>
@@ -190,5 +190,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>&ldquo;Dark patterns&rdquo; are <a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
+    
href="https://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
     interfaces designed to mislead users, or make option settings hard
     to find</a>.</p>
@@ -259,5 +259,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/06 07:57:27 $
+$Date: 2022/04/13 07:49:53 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-obsolescence.html proprietary-obsolescence.html
--- proprietary-obsolescence.html       2022-04-13 04:04:23.661444568 +0000
+++ proprietary-obsolescence.html       2022-04-14 04:04:14.967112482 +0000
@@ -87,5 +87,5 @@
     <p>ChromeBooks are programmed for obsolescence:
     ChromeOS has a universal back door that is used for updates and <a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
     ceases to operate at a predefined date</a>. From then on, there
     appears to be no support whatsoever for the computer.</p>
@@ -146,5 +146,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The <a
-    href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
+    href="https://michaelweinberg.org/post/137045828005/free-the-cube";>
     &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it
     won't accept third-party printing materials.  It is the Keurig of
@@ -154,5 +154,5 @@
 
     <p>With a <a
-    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+    href="https://www.fsf.org/resources/hw/endorsement/aleph-objects";>
     printer that gets the Respects Your Freedom</a>, this problem would
     not even be a remote possibility.</p>
@@ -217,5 +217,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2019, 2020, 2021, 2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -227,5 +227,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:53 $
+$Date: 2022/04/13 07:56:42 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-sabotage.html proprietary-sabotage.html
--- proprietary-sabotage.html   2022-04-13 04:04:23.665444569 +0000
+++ proprietary-sabotage.html   2022-04-14 04:04:14.971112485 +0000
@@ -107,5 +107,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple has <a
-    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours/";>implemented
     a malware in its computers that imposes surveillance</a> on users
     and reports users' computing to Apple.</p>
@@ -211,5 +211,5 @@
     program</a> on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
+    
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
     tampering with users' settings and files</a>, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
@@ -329,5 +329,5 @@
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
-    
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+    
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
     shut down the server, and all copies stopped working</a>.</p>
   </li>
@@ -366,5 +366,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html";>
+    
href="https://www.macworld.com/article/230582/apple-file-system-apfs-faq.html";>
     changes the file system from HFS+  to APFS</a>, which cannot be
     accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
@@ -399,5 +399,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Sonos <a
-    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
+    
href="https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
     told all its customers, &ldquo;Agree&rdquo;
     to snooping or the product will stop working</a>.  <a
@@ -424,5 +424,5 @@
     <p>Bird and rabbit pets were implemented for Second
     Life by a company that tethered their food to a server.  <a
-    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying";>
+    
href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying";>
     It shut down the server and the pets more or less died</a>.</p>
   </li>
@@ -433,5 +433,5 @@
     <p>Microsoft has made Windows 7
     and 8 cease to function on certain new computers, <a
-    
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
+    
href="https://docs.microsoft.com/en-US/troubleshoot/windows-client/deployment/processor-not-supported-together-with-windows-version";>effectively
     forcing their owners to switch to Windows 10</a>.</p>
   </li>
@@ -479,5 +479,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The developer of Ham Radio Deluxe <a
-    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>sabotaged
+    
href="https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/";>sabotaged
     a customer's installation as punishment for posting a negative
     review</a>.</p>
@@ -508,9 +508,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
-    
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
+    
href="https://www.theregister.com/2016/06/03/windows_10_upgrade_satellite_link/";>
     jeopardize important operations in regions of the world with poor
     connectivity</a>, but many of the people who let installation proceed
     found out that this &ldquo;upgrade&rdquo; was in fact a <a
-    
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    
href="https://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
     downgrade</a>.</p>
   </li>
@@ -520,5 +520,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple <a
-    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
+    
href="https://www.theregister.com/2016/04/14/uninstall_quicktime_for_windows/";>
     stops users from fixing the security bugs in Quicktime for Windows</a>,
     while refusing to fix them itself.</p>
@@ -530,5 +530,5 @@
     <p>Once Microsoft has tricked a user
     into accepting installation of Windows 10, <a
-    
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+    
href="https://www.theregister.com/2016/06/01/windows_10_nagware_no_way_out/";>they
     find that they are denied the option to cancel or even postpone the
     imposed date of installation</a>.</p>
@@ -581,8 +581,8 @@
     <p>FTDI's proprietary driver
     for its USB-to-serial chips has been designed to <a
-    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
+    
href="https://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
     alternative compatible chips</a>
     so that they no longer work. Microsoft is <a
-    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
+    
href="https://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
     this automatically</a> as an &ldquo;upgrade&rdquo;.</p>
   </li>
@@ -593,5 +593,5 @@
     <p>Philips &ldquo;smart&rdquo; lightbulbs had initially been
     designed to interact with other companies' smart light bulbs, but <a
-    
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+    
href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/";>
     later the company updated the firmware to disallow
     interoperability</a>.</p>
@@ -605,5 +605,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google has long had <a
-    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+    
href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
     back door to remotely unlock an Android device</a>, unless its disk
     is encrypted (possible since Android 5.0 Lollipop, but still not
@@ -646,5 +646,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio <a
-    href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+    
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch</a>.  The TVs did not do that when first sold.</p>
@@ -683,5 +683,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon <a
-    
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
+    
href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/";>
     downgraded the software in users' Swindles</a> so that those already
     rooted would cease to function at all.</p>
@@ -692,5 +692,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple <a
-    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
+    
href="https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
     deleted from iPods the music that users had got from internet music
     stores that competed with iTunes</a>.</p>
@@ -713,5 +713,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>LG <a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+    
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/";>
     disabled network features</a> on <em>previously purchased</em>
     &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
@@ -723,5 +723,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Some proprietary <a
-    
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+    
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
     games lure children to spend their parents' money</a>.</p>
   </li>
@@ -731,5 +731,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
+    
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
     NSA has put back doors into nonfree encryption software</a>. We don't
     know which ones they are, but we can be sure they include some widely
@@ -750,5 +750,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Adobe applications have time bombs: they <a
-    
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
+    
href="https://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
     stop working after a certain time</a>, after which the user
     must pay to extend the time.</p>
@@ -764,5 +764,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Oracle's nonfree Java plug-in for browsers <a
-    
href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>sneakily
+    
href="https://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>sneakily
     installs other annoying proprietary software</a>.</p>
 
@@ -795,5 +795,5 @@
 
     <p>In a court settlement Sony is <a
-    
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+    
href="https://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
     now paying for the sabotage</a>.</p>
   </li>
@@ -860,5 +860,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2015-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2015-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -870,5 +870,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/19 08:18:48 $
+$Date: 2022/04/13 07:56:42 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-surveillance.html proprietary-surveillance.html
--- proprietary-surveillance.html       2022-04-13 04:04:23.669444569 +0000
+++ proprietary-surveillance.html       2022-04-14 04:04:14.979112492 +0000
@@ -218,5 +218,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>HP's proprietary operating system <a
-    href="http://www.bbc.com/news/technology-42309371";>includes a
+    href="https://www.bbc.com/news/technology-42309371";>includes a
     proprietary keyboard driver with a key logger in it</a>.</p>
   </li>
@@ -231,5 +231,5 @@
     fourth stable build of Windows 10, called the
     &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a
-    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
+    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/";>
     by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
 
@@ -256,5 +256,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>By default, Windows 10 <a
-    
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
+    
href="https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/";>sends
     debugging information to Microsoft, including core dumps</a>. Microsoft
     now distributes them to another company.</p>
@@ -301,5 +301,5 @@
     applications.  Then another downgrade inserted a general spying
     program.  Users noticed this and complained, so Microsoft renamed it <a
-    
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+    
href="https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
     to give users the impression it was gone</a>.</p>
 
@@ -320,5 +320,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
+    
href="https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
     Windows 10 sends identifiable information to Microsoft</a>, even if
     a user turns off its Bing search and Cortana features, and activates
@@ -367,5 +367,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>It only gets worse with time.  <a
-    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+    
href="https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
     Windows 10 requires users to give permission for total snooping</a>,
     including their files, their commands, their text input, and their
@@ -385,5 +385,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Spyware in older versions of Windows: <a
-    href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+    href="https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/";>
     Windows Update snoops on the user</a>. <a
     
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
@@ -410,5 +410,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple has <a
-    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours/";>implemented
     a malware in its computers that imposes surveillance</a> on users
     and reports users' computing to Apple.</p>
@@ -432,5 +432,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple has made various <a
-    
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
+    
href="https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
     MacOS programs send files to Apple servers without asking
     permission</a>.  This exposes the files to Big Brother and perhaps
@@ -459,5 +459,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple admits the <a
-    
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
+    
href="https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
     spying in a search facility</a>, but there's a lot <a
     href="https://github.com/fix-macosx/yosemite-phone-home";> more snooping
@@ -469,5 +469,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Various operations in <a
-    
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
+    
href="https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
     the latest MacOS send reports to Apple</a> servers.</p>
   </li>
@@ -477,5 +477,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+    
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     Spotlight search</a> sends users' search terms to Apple.</p>
   </li>
@@ -613,5 +613,5 @@
     <p>The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is <a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html";>
+    href="https://news.northwestern.edu/stories/2016/01/fool-activity-tracker";>
     proprietary software to make sure they can't &ldquo;fool&rdquo;
     the monitoring</a>.</p>
@@ -622,5 +622,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>According to Edward Snowden, <a
-    href="http://www.bbc.com/news/uk-34444233";>agencies can take over
+    href="https://www.bbc.com/news/uk-34444233";>agencies can take over
     smartphones</a> by sending hidden text messages which enable
     them to turn the phones on and off, listen to the microphone,
@@ -649,5 +649,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Portable phones with GPS <a
-    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
+    
href="https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked";>
     will send their GPS location on remote command, and users cannot stop
     them</a>. (The US says it will eventually require all new portable phones
@@ -794,5 +794,5 @@
     make are automatically updated everywhere. [&hellip;] </p></blockquote>
 
-    <p>(From <a href="https://www.apple.com/icloud/photos/";>Apple's iCloud
+    <p>(From <a 
href="https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/";>Apple's
 iCloud
     information</a> as accessed on 24 Sep 2015.) The iCloud feature is
     <a href="https://support.apple.com/en-us/HT202033";>activated by the
@@ -816,5 +816,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple can, and regularly does, <a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+    
href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
     remotely extract some data from iPhones for the state</a>.</p>
 
@@ -822,5 +822,5 @@
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
     iOS 8 security improvements</a>; but <a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
+    href="https://theintercept.com/2014/09/22/apple-data/";>
     not as much as Apple claims</a>.</p>
   </li>
@@ -830,5 +830,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+    
href="https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
     Several &ldquo;features&rdquo; of iOS seem to exist
     for no possible purpose other than surveillance</a>.  Here is the <a
@@ -841,5 +841,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The <a class="not-a-duplicate"
-    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+    
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     iBeacon</a> lets stores determine exactly where the iThing is, and
     get other info too.</p>
@@ -850,5 +850,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
-    
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
+    
href="https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
     Either Apple helps the NSA snoop on all the data in an iThing, or it
     is totally incompetent</a>.</p>
@@ -859,5 +859,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The iThing also <a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
+    
href="https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
     tells Apple its geolocation</a> by default, though that can be
     turned off.</p>
@@ -868,5 +868,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>There is also a feature for web sites to track users, which is <a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
+    
href="https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
     enabled by default</a>.  (That article talks about iOS 6, but it is
     still true in iOS 7.)</p>
@@ -954,5 +954,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Android tracks location for Google <a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
+    
href="https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/";>
     even when &ldquo;location services&rdquo; are turned off, even when
     the phone has no SIM card</a>.</p>
@@ -985,5 +985,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Samsung phones come with <a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>apps
+    
href="https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>apps
     that users can't delete</a>, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
@@ -1004,8 +1004,8 @@
     <p>Spyware in Android phones (and Windows? laptops): The Wall Street
     Journal (in an article blocked from us by a paywall) reports that <a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
+    
href="https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
     the FBI can remotely activate the GPS and microphone in Android phones
     and laptops</a> (presumably Windows laptops).  Here is <a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
+    href="https://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
   </li>
 
@@ -1032,5 +1032,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google Play intentionally sends app developers <a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
+    
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
     the personal details of users that install the app</a>.</p>
 
@@ -1051,5 +1051,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Some manufacturers add a <a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
+    
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
     hidden general surveillance package such as Carrier IQ</a>.</p>
   </li>
@@ -1067,5 +1067,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>E-books can contain JavaScript code, and <a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
+    
href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
     sometimes this code snoops on readers</a>.</p>
   </li>
@@ -1452,10 +1452,10 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The AppCensus database gives information on <a
-    href="https://www.appcensus.mobi";> how Android apps use and
+    href="https://www.appcensus.io/";> how Android apps use and
     misuse users' personal data</a>. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the <a
     href="/proprietary/proprietary-surveillance.html#M201812290">
     Advertising ID</a> to other companies, and <a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/";>
+    href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/";>
     18,000 (23% of the total) link this ID to hardware identifiers</a>,
     so that users cannot escape tracking by resetting it.</p>
@@ -1500,5 +1500,5 @@
     <p>An investigation of the 150 most popular
     gratis VPN apps in Google Play found that <a
-    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/";>
+    
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/";>
     25% fail to protect their users' privacy</a> due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
@@ -1508,5 +1508,5 @@
 
     <p>Moreover, a previous investigation had found that <a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/";>half of
+    
href="https://www.top10vpn.com/research/free-vpn-investigations/ownership/";>half
 of
     the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
 
@@ -1556,5 +1556,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Some Android apps <a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
+    
href="https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
     track the phones of users that have deleted them</a>.</p>
   </li>
@@ -1681,5 +1681,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>20 dishonest Android apps recorded <a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>phone
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/";>phone
     calls and sent them and text messages and emails to snoopers</a>.</p>
 
@@ -1807,5 +1807,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A <a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
+    
href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
     research paper</a> that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
@@ -1855,5 +1855,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Google's new voice messaging app <a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
+    
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
     all conversations</a>.</p>
   </li>
@@ -1863,5 +1863,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Facebook's new Magic Photo app <a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>
+    
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/";>
     scans your mobile phone's photo collections for known faces</a>,
     and suggests you circulate the picture you take according to who is
@@ -1891,5 +1891,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A pregnancy test controller application not only can <a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
     spy on many sorts of data in the phone, and in server accounts,
     it can alter them too</a>.</p>
@@ -1911,5 +1911,5 @@
     <p>&ldquo;Cryptic communication,&rdquo;
     unrelated to the app's functionality, was <a
-    href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+    href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
     found in the 500 most popular gratis Android apps</a>.</p>
 
@@ -1938,10 +1938,10 @@
     <p>Like most &ldquo;music screaming&rdquo; disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it <a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy";>
+    
href="https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy";>
     demanded users submit to increased snooping</a>, and some are starting
     to realize that it is nasty.</p>
 
     <p>This article shows the <a
-    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
+    href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/";>
     twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better</a>&mdash;never mind whether they want that. This is a
@@ -1973,5 +1973,5 @@
     <p>Gratis Android apps (but not <a
     href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>tracking
+    
href="https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>tracking
     and advertising</a> URLs, on the average.</p>
   </li>
@@ -1981,5 +1981,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Widely used <a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/";>proprietary
+    
href="https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/";>proprietary
     QR-code scanner apps snoop on the user</a>. This is in addition to
     the snooping done by the phone company, and perhaps by the OS in
@@ -1996,5 +1996,5 @@
     <p>Many proprietary apps for mobile devices
     report which other apps the user has installed.  <a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
+    href="https://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
     is doing this in a way that at least is visible and optional</a>. Not
     as bad as what the others do.</p>
@@ -2014,5 +2014,5 @@
     <p>The nonfree Snapchat app's principal purpose is to restrict the
     use of data on the user's computer, but it does surveillance too: <a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
+    
href="https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
     it tries to get the user's list of other people's phone
     numbers</a>.</p>
@@ -2023,5 +2023,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Brightest Flashlight app <a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
+    
href="https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
     sends user data, including geolocation, for use by companies</a>.</p>
 
@@ -2038,6 +2038,6 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>FTC says most mobile apps for children don't respect privacy: <a
-    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+    
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
+    
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
   </li>
 </ul>
@@ -2066,5 +2066,5 @@
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
     Microsoft changed Skype <a
-    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+    
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
     specifically for spying</a>.</p>
   </li>
@@ -2121,5 +2121,5 @@
     program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet <a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave";>
+    
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave";>
     to snoop on all open processes running on its user's computer</a>.</p>
   </li>
@@ -2137,5 +2137,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many <a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/";>
+    
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html";>
     video game consoles snoop on their users and report to the
     internet</a>&mdash;even what their users weigh.</p>
@@ -2149,5 +2149,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Modern gratis game cr&hellip;apps <a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+    
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
     collect a wide range of data about their users and their users'
     friends and associates</a>.</p>
@@ -2169,5 +2169,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Angry Birds <a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
+    
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
     spies for companies, and the NSA takes advantage
     to spy through it too</a>.  Here's information on <a
@@ -2205,5 +2205,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Most Internet connected devices in Mozilla's <a
-    href="https://foundation.mozilla.org/en/privacynotincluded";>&ldquo;Privacy
+    href="https://foundation.mozilla.org/en/privacynotincluded/";>&ldquo;Privacy
     Not Included&rdquo;</a> list <a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell";>are
@@ -2220,5 +2220,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The bad security in many Internet of Stings devices allows <a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+    
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/";>ISPs
     to snoop on the people that use them</a>.</p>
 
@@ -2319,5 +2319,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio &ldquo;smart&rdquo; <a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
+    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
     report everything that is viewed on them, and not just broadcasts and
     cable</a>. Even if the image is coming from the user's own computer,
@@ -2335,5 +2335,5 @@
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other <a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
+    
href="https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
     cross-device tracking</a>.</p>
   </li>
@@ -2361,5 +2361,5 @@
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now <a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
+    href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
     correlate TV advertisement with online purchases</a>, exposing all
     users to new combined surveillance by default.</p>
@@ -2370,5 +2370,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio &ldquo;smart&rdquo; TVs recognize and <a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>track
+    href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html";>track
     what people are watching</a>, even if it isn't a TV channel.</p>
   </li>
@@ -2378,5 +2378,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Verizon cable TV <a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
+    
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
     snoops on what programs people watch, and even what they wanted to
     record</a>.</p>
@@ -2387,5 +2387,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Vizio <a
-    href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+    
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch</a>.  The TVs did not do that when first sold.</p>
@@ -2405,5 +2405,5 @@
 
     <p>In its privacy policy, Samsung explicitly confirms that <a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
+    
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
     data containing sensitive information will be transmitted to third
     parties</a>.</p>
@@ -2414,5 +2414,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Amazon &ldquo;Smart&rdquo; TV is <a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
+    
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
     snooping all the time</a>.</p>
   </li>
@@ -2422,5 +2422,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>More or less all &ldquo;smart&rdquo; TVs <a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
+    
href="https://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
     on their users</a>.</p>
 
@@ -2448,5 +2448,5 @@
 
     <p>Even worse, it <a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
+    
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/";>
     snoops on other devices on the user's local network</a>.</p>
 
@@ -2455,5 +2455,5 @@
 
     <p>Meanwhile, LG TVs <a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+    
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/";>
     do lots of spying anyway</a>.</p>
   </li>
@@ -2480,5 +2480,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Amazon Ring &ldquo;security&rdquo; devices <a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/";>
+    
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html";>
     send the video they capture to Amazon servers</a>, which save it
     long-term.</p>
@@ -2497,5 +2497,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Nearly all &ldquo;home security cameras&rdquo; <a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/";>
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/";>
     give the manufacturer an unencrypted copy of everything they
     see</a>. &ldquo;Home insecurity camera&rdquo; would be a better
@@ -2520,5 +2520,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Nest Cam &ldquo;smart&rdquo; camera is <a
-    href="http://www.bbc.com/news/technology-34922712";>always watching</a>,
+    href="https://www.bbc.com/news/technology-34922712";>always watching</a>,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;</p>
 
@@ -2539,5 +2539,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Furby Connect has a <a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
+    
href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
     universal back door</a>. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
@@ -2549,5 +2549,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A remote-control sex toy was found to make <a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei";>audio
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance";>audio
     recordings of the conversation between two users</a>.</p>
   </li>
@@ -2603,5 +2603,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit <a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>children's
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/";>children's
     conversations to Nuance Communications</a>, a speech recognition
     company based in the U.S.</p>
@@ -2617,5 +2617,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Barbie <a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>is
+    
href="https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>is
     going to spy on children and adults</a>.</p>
   </li>
@@ -2801,5 +2801,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A medical insurance company <a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next";>
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/";>
     offers a gratis electronic toothbrush that snoops on its user by
     sending usage data back over the Internet</a>.</p>
@@ -2823,5 +2823,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="nest-thermometers">Nest thermometers send <a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a lot of
+    href="https://bgr.com/general/google-nest-jailbreak-hack/";>a lot of
     data about the user</a>.</p>
   </li>
@@ -2879,5 +2879,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
+    
href="https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
     that connects to an unidentified site in China</a>.</p>
 
@@ -2890,5 +2890,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>An LG &ldquo;smart&rdquo; watch is designed <a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html";>
+    
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html";>
     to report its location to someone else and to transmit conversations
     too</a>.</p>
@@ -2951,5 +2951,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The FordPass Connect feature of some Ford vehicles has <a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+    
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
     near-complete access to the internal car network</a>. It is constantly
     connected to the cellular phone network and sends Ford a lot of data,
@@ -2967,5 +2967,5 @@
     <p>In China, it is mandatory for electric
     cars to be equipped with a terminal that <a
-    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca";>
+    
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca";>
     transfers technical data, including car location,
     to a government-run platform</a>. In practice, <a
@@ -3049,5 +3049,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p id="records-drivers">Proprietary software in cars <a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
+    
href="https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
     records information about drivers' movements</a>, which is made
     available to car manufacturers, insurance companies, and others.</p>
@@ -3143,5 +3143,5 @@
     <p>When a page uses Disqus
     for comments, the proprietary Disqus software <a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook";>loads
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/";>loads
     a Facebook software package into the browser of every anonymous visitor
     to the page, and makes the page's URL available to Facebook</a>.</p>
@@ -3182,5 +3182,5 @@
     <p>Many web sites report all their visitors
     to Google by using the Google Analytics service, which <a
-    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
+    
href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
     tells Google the IP address and the page that was visited</a>.</p>
   </li>
@@ -3215,5 +3215,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    
href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
     to snoop on information that users have typed into a
     form but not sent</a>, in order to learn their identity. Some are <a
@@ -3268,5 +3268,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Flash and JavaScript are used for <a
-    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
+    
href="https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
     &ldquo;fingerprinting&rdquo; devices</a> to identify users.</p>
   </li>
@@ -3468,5 +3468,5 @@
     <p>While the world is still
     struggling with COVID-19 coronavirus, many <a
-    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/";>people
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus";>people
     are in danger of surveillance</a> and their computers are infected
     with malware as a result of installing proprietary software.</p>
@@ -3477,5 +3477,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/";>are
     collecting user's personal and identifiable data</a> including how long
     a call lasts, who's participating in the call, and the IP addresses
@@ -3533,5 +3533,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Investigation Shows <a
-    
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
+    
href="https://www.techdirt.com/2016/06/03/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions/";>GCHQ
     Using US Companies, NSA To Route Around Domestic Surveillance
     Restrictions</a>.</p>
@@ -3545,5 +3545,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Cisco TNP IP phones are <a
-    href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
+    
href="https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
     spying devices</a>.</p>
   </li>
@@ -3609,5 +3609,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/06 07:41:52 $
+$Date: 2022/04/13 12:46:51 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-tethers.html proprietary-tethers.html
--- proprietary-tethers.html    2022-04-13 04:04:23.673444568 +0000
+++ proprietary-tethers.html    2022-04-14 04:04:14.979112492 +0000
@@ -134,5 +134,5 @@
     <p>Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start <a
-    
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
+    
href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
     paying a monthly fee for the use of that server</a>.  Because of the
     tethering, the hub is useless without that.</p>
@@ -157,5 +157,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The Jibo robot toys were tethered to the manufacturer's server,
-    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    and <a 
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648";>
     the company made them all cease to work</a> by shutting down that
     server.</p>
@@ -227,5 +227,5 @@
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
-    
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+    
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
     shut down the server, and all copies stopped working</a>.</p>
   </li>
@@ -274,5 +274,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>The recent versions of Microsoft Office require the user to <a
-    
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+    
href="https://www.microsoft.com/en-us/microsoft-365/microsoft-365-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
     connect to Microsoft servers at least every thirty-one
     days</a>. Otherwise, the software will refuse to edit any documents
@@ -285,5 +285,5 @@
     <p>Bird and rabbit pets were implemented for Second
     Life by a company that tethered their food to a server.  <a
-    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying";>
+    
href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying";>
     It shut down the server and the pets more or less died</a>.</p>
   </li>
@@ -303,5 +303,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>nVidia's proprietary GeForce Experience <a
-    
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis";>makes
+    
href="https://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis";>makes
     users identify themselves and then sends personal data about them to
     nVidia servers</a>.</p>
@@ -321,5 +321,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>A half-blind security critique of a tracking app: it found that <a
-    
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/";>
+    
href="https://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats-a1100919965/";>
     blatant flaws allowed anyone to snoop on a user's personal data</a>.
     The critique fails entirely to express concern that the app sends the
@@ -416,5 +416,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/04/06 07:37:01 $
+$Date: 2022/04/13 08:51:18 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-tyrants.html proprietary-tyrants.html
--- proprietary-tyrants.html    2022-04-13 04:04:23.673444568 +0000
+++ proprietary-tyrants.html    2022-04-14 04:04:15.003112514 +0000
@@ -71,5 +71,5 @@
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
-    
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+    
href="https://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
     &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall
     to call this &ldquo;protecting&rdquo; the users.  The article talks
@@ -82,5 +82,5 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p>Apple arbitrarily <a
-    href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
+    href="https://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
     users from installing old versions of iOS</a>.</p>
   </li>
@@ -89,5 +89,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2014-03</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255";>
+    <p><a href="https://soylentnews.org/article.pl?sid=14/03/15/1912255";>
     Intel processors will have tyrant software built in</a>.</p>
   </li>
@@ -135,5 +135,5 @@
     <!--#set var="DATE" value='<small class="date-tag">2011-10</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
+    <p><a href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
     Mobile devices that come with Windows 8 are tyrants</a>.</p>
   </li>
@@ -196,5 +196,5 @@
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2022 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
@@ -206,5 +206,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:53 $
+$Date: 2022/04/13 07:56:42 $
 <!-- timestamp end -->
 </p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]